diff --git a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.json b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.json index 8b2c6af9787f..cc04b1d6b70f 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.json +++ b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.json @@ -13,18 +13,17 @@ "cache-control": "no-cache", "content-length": "87", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:51 GMT", + "date": "Tue, 12 Jan 2021 23:55:58 GMT", "expires": "-1", "pragma": "no-cache", "status": "401", "strict-transport-security": "max-age=31536000;includeSubDomains", "www-authenticate": "Bearer authorization=\"https://login.windows.net/azure_tenant_id\", resource=\"https://vault.azure.net\"", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "fae42466-fe8e-4bb3-a9eb-2bbc7feb6844", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "3e13f223-cd0a-412c-b434-9404d8907f34", "x-powered-by": "ASP.NET" } }, @@ -41,18 +40,17 @@ "cache-control": "no-cache", "content-length": "87", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:51 GMT", + "date": "Tue, 12 Jan 2021 23:55:58 GMT", "expires": "-1", "pragma": "no-cache", "status": "401", "strict-transport-security": "max-age=31536000;includeSubDomains", "www-authenticate": "Bearer authorization=\"https://login.windows.net/azure_tenant_id\", resource=\"https://vault.azure.net\"", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "f067a521-58c9-4692-931e-c04fcc152eca", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "bed72b2c-e5c1-4a8b-9b49-7f464d444188", "x-powered-by": "ASP.NET" } }, @@ -64,18 +62,18 @@ "status": 200, "response": "{\"token_type\":\"Bearer\",\"expires_in\":86399,\"ext_expires_in\":86399,\"access_token\":\"access_token\"}", "responseHeaders": { - "cache-control": "no-cache, no-store", + "cache-control": "no-store, no-cache", "content-length": "1315", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:51 GMT", + "date": "Tue, 12 Jan 2021 23:55:58 GMT", "expires": "-1", "p3p": "CP=\"DSP CUR OTPi IND OTRi ONL FIN\"", "pragma": "no-cache", "referrer-policy": "strict-origin-when-cross-origin", "strict-transport-security": "max-age=31536000; includeSubDomains", "x-content-type-options": "nosniff", - "x-ms-ests-server": "2.1.10732.8 - WUS2 ProdSlices", - "x-ms-request-id": "077837e8-2309-49b1-b1ef-557f02bd0d01" + "x-ms-ests-server": "2.1.11397.11 - WUS2 ProdSlices", + "x-ms-request-id": "43ce4ade-bf75-478b-9ba7-422b62780300" } }, { @@ -86,18 +84,18 @@ "status": 200, "response": "{\"token_type\":\"Bearer\",\"expires_in\":86399,\"ext_expires_in\":86399,\"access_token\":\"access_token\"}", "responseHeaders": { - "cache-control": "no-cache, no-store", + "cache-control": "no-store, no-cache", "content-length": "1315", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:52 GMT", + "date": "Tue, 12 Jan 2021 23:55:58 GMT", "expires": "-1", "p3p": "CP=\"DSP CUR OTPi IND OTRi ONL FIN\"", "pragma": "no-cache", "referrer-policy": "strict-origin-when-cross-origin", "strict-transport-security": "max-age=31536000; includeSubDomains", "x-content-type-options": "nosniff", - "x-ms-ests-server": "2.1.10732.8 - SCUS ProdSlices", - "x-ms-request-id": "6d3bcc30-fd00-4a68-b656-d0eaa9d10101" + "x-ms-ests-server": "2.1.11397.11 - SCUS ProdSlices", + "x-ms-request-id": "b976c21f-4b5c-4506-b46e-c91da21b0100" } }, { @@ -108,22 +106,21 @@ }, "requestBody": "{\"value\":\"value\",\"attributes\":{}}", "status": 200, - "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/614f3feca2774799817d174a1a93b7bd\",\"attributes\":{\"enabled\":true,\"created\":1593089212,\"updated\":1593089212,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/ee713fd507a44cd4bf6a4e176669220c\",\"attributes\":{\"enabled\":true,\"created\":1610495759,\"updated\":1610495759,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "328", + "content-length": "329", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:52 GMT", + "date": "Tue, 12 Jan 2021 23:55:59 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "dcf79294-efba-49f5-b833-f6162e5c91b9", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "0416c815-d917-4095-b6c8-d5f041b3fb46", "x-powered-by": "ASP.NET" } }, @@ -135,22 +132,21 @@ }, "requestBody": "{\"value\":\"value\",\"attributes\":{}}", "status": 200, - "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/f0a3729a26eb4876a7cebe60e870ccb9\",\"attributes\":{\"enabled\":true,\"created\":1593089212,\"updated\":1593089212,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/cecd718989f64475a93f2b21a592b804\",\"attributes\":{\"enabled\":true,\"created\":1610495759,\"updated\":1610495759,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "328", + "content-length": "329", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:52 GMT", + "date": "Tue, 12 Jan 2021 23:55:59 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "ece12076-0f28-4663-a204-292fcff4347b", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "884ec148-c8a3-4b5d-afde-073aef07fa7c", "x-powered-by": "ASP.NET" } }, @@ -162,22 +158,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\",\"deletedDate\":1593089212,\"scheduledPurgeDate\":1600865212,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/f0a3729a26eb4876a7cebe60e870ccb9\",\"attributes\":{\"enabled\":true,\"created\":1593089212,\"updated\":1593089212,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\",\"deletedDate\":1610495759,\"scheduledPurgeDate\":1618271759,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/cecd718989f64475a93f2b21a592b804\",\"attributes\":{\"enabled\":true,\"created\":1610495759,\"updated\":1610495759,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "529", + "content-length": "531", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:52 GMT", + "date": "Tue, 12 Jan 2021 23:55:59 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "779bb734-3cf7-43b3-9038-84ff9995dfb7", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "55da2ad8-75e9-41f4-8c90-6961d62c37d4", "x-powered-by": "ASP.NET" } }, @@ -194,17 +189,16 @@ "cache-control": "no-cache", "content-length": "160", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:52 GMT", + "date": "Tue, 12 Jan 2021 23:55:59 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "03b28649-3a93-4bf9-b5c8-77f434348b9b", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "004b4cb8-1468-4fd1-9577-ec54cf033dfe", "x-powered-by": "ASP.NET" } }, @@ -221,17 +215,16 @@ "cache-control": "no-cache", "content-length": "160", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:52 GMT", + "date": "Tue, 12 Jan 2021 23:55:59 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "1efad4de-5eff-49ca-87f6-4235ac4d6621", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "2db9e529-74eb-45d4-bdde-fc5c3e344970", "x-powered-by": "ASP.NET" } }, @@ -248,179 +241,16 @@ "cache-control": "no-cache", "content-length": "160", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:54 GMT", + "date": "Tue, 12 Jan 2021 23:56:01 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "bac87ed4-f30c-4652-ac35-8cf7c554d65a", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:56 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "2f6dcd12-499f-471e-950e-9d3d5eb5eb4f", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:58 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "868120b8-addc-4a2c-9125-83fa20ddf63d", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:00 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "e2506ff6-1c99-4966-9523-e233f2c815b7", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:02 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "e0d5f535-9141-45b7-b4fd-915907396f72", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:04 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "298f4a24-e3e7-41c3-9077-c7346782f6ae", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:07 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "5baa1c00-18c5-4424-bb20-cc73dd597f44", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "d96bcc2c-b02b-44a2-b6dd-d30e92a40aec", "x-powered-by": "ASP.NET" } }, @@ -432,22 +262,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\",\"deletedDate\":1593089212,\"scheduledPurgeDate\":1600865212,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/f0a3729a26eb4876a7cebe60e870ccb9\",\"attributes\":{\"enabled\":true,\"created\":1593089212,\"updated\":1593089212,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0\",\"deletedDate\":1610495759,\"scheduledPurgeDate\":1618271759,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/cecd718989f64475a93f2b21a592b804\",\"attributes\":{\"enabled\":true,\"created\":1610495759,\"updated\":1610495759,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "529", + "content-length": "531", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:08 GMT", + "date": "Tue, 12 Jan 2021 23:56:03 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "6411cb9f-4299-4990-afb3-182764ac2a77", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "82817b37-ae8f-4b24-aad3-739cc43012ed", "x-powered-by": "ASP.NET" } }, @@ -462,17 +291,16 @@ "response": "", "responseHeaders": { "cache-control": "no-cache", - "date": "Thu, 25 Jun 2020 12:47:09 GMT", + "date": "Tue, 12 Jan 2021 23:56:03 GMT", "expires": "-1", "pragma": "no-cache", "status": "204", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "67c3d444-7c91-4d26-b4e2-981a867b6029", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "165906b9-38a4-4b82-8ac8-42854971109d", "x-powered-by": "ASP.NET" } }, @@ -484,157 +312,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\",\"deletedDate\":1593089229,\"scheduledPurgeDate\":1600865229,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/614f3feca2774799817d174a1a93b7bd\",\"attributes\":{\"enabled\":true,\"created\":1593089212,\"updated\":1593089212,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\",\"deletedDate\":1610495764,\"scheduledPurgeDate\":1618271764,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/ee713fd507a44cd4bf6a4e176669220c\",\"attributes\":{\"enabled\":true,\"created\":1610495759,\"updated\":1610495759,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "529", + "content-length": "531", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:09 GMT", + "date": "Tue, 12 Jan 2021 23:56:03 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "349563fc-9788-42f9-aefe-cd28c83d2210", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:09 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "b4b220a7-4b83-4699-893c-fb76b2e1cdff", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:09 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "f3b6ae33-0100-4329-ac86-40efda1be2db", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:11 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "c1c97b58-a214-4c6d-9a7c-5a25e2cc2ee9", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:13 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "00187e02-7b58-4f66-86d6-c9112aba6ef7", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "160", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:15 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "2f102f3f-8272-4d37-9214-1755c47cacca", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "44785d08-ab20-41e9-8b58-5a4b6198829f", "x-powered-by": "ASP.NET" } }, @@ -651,17 +343,16 @@ "cache-control": "no-cache", "content-length": "160", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:17 GMT", + "date": "Tue, 12 Jan 2021 23:56:03 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "23e9b914-9e81-4018-851b-768a7f6dfa4d", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "86e409c6-69b8-4c1d-aa0f-da96ecfe221a", "x-powered-by": "ASP.NET" } }, @@ -678,17 +369,16 @@ "cache-control": "no-cache", "content-length": "160", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:19 GMT", + "date": "Tue, 12 Jan 2021 23:56:03 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "8a658cab-9239-4cb8-acb8-0231380773a1", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "8d85546a-102d-458c-9e74-e4f9d423b053", "x-powered-by": "ASP.NET" } }, @@ -705,17 +395,16 @@ "cache-control": "no-cache", "content-length": "160", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:21 GMT", + "date": "Tue, 12 Jan 2021 23:56:06 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "927a6556-9d4b-42d4-86a1-82928bca8ef5", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "65070a7f-7f50-4721-9499-5e628d9fb246", "x-powered-by": "ASP.NET" } }, @@ -727,22 +416,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\",\"deletedDate\":1593089229,\"scheduledPurgeDate\":1600865229,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/614f3feca2774799817d174a1a93b7bd\",\"attributes\":{\"enabled\":true,\"created\":1593089212,\"updated\":1593089212,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1\",\"deletedDate\":1610495764,\"scheduledPurgeDate\":1618271764,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/ee713fd507a44cd4bf6a4e176669220c\",\"attributes\":{\"enabled\":true,\"created\":1610495759,\"updated\":1610495759,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "529", + "content-length": "531", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:47:22 GMT", + "date": "Tue, 12 Jan 2021 23:56:08 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "e1f2daad-df8e-46d1-87c0-55ff29f809de", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "14dac50d-76e8-4052-99c3-5bc5c9710e69", "x-powered-by": "ASP.NET" } }, @@ -757,17 +445,16 @@ "response": "", "responseHeaders": { "cache-control": "no-cache", - "date": "Thu, 25 Jun 2020 12:47:23 GMT", + "date": "Tue, 12 Jan 2021 23:56:08 GMT", "expires": "-1", "pragma": "no-cache", "status": "204", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "cfc19cdc-ee11-49e6-a88f-ac4d32844896", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "9bcc647a-5805-4e20-a2eb-d8114405b24b", "x-powered-by": "ASP.NET" } } @@ -776,5 +463,5 @@ "uniqueName": {}, "newDate": {} }, - "hash": "b080bc3cf0bfa71f5b6d1204b814a3bf" + "hash": "c23f81ebf5586eea368bfbd3d89e6589" } \ No newline at end of file diff --git a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.json b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.json index f3c0aa6a08d7..84e04e076c8a 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.json +++ b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.json @@ -13,18 +13,17 @@ "cache-control": "no-cache", "content-length": "87", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:25 GMT", + "date": "Tue, 12 Jan 2021 23:56:08 GMT", "expires": "-1", "pragma": "no-cache", "status": "401", "strict-transport-security": "max-age=31536000;includeSubDomains", "www-authenticate": "Bearer authorization=\"https://login.windows.net/azure_tenant_id\", resource=\"https://vault.azure.net\"", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "50858f25-2a7d-4107-a3b2-44b16d6991b8", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "93373826-cb5e-4a55-a273-ddeb14c5a950", "x-powered-by": "ASP.NET" } }, @@ -36,18 +35,18 @@ "status": 200, "response": "{\"token_type\":\"Bearer\",\"expires_in\":86399,\"ext_expires_in\":86399,\"access_token\":\"access_token\"}", "responseHeaders": { - "cache-control": "no-cache, no-store", + "cache-control": "no-store, no-cache", "content-length": "1315", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:25 GMT", + "date": "Tue, 12 Jan 2021 23:56:07 GMT", "expires": "-1", "p3p": "CP=\"DSP CUR OTPi IND OTRi ONL FIN\"", "pragma": "no-cache", "referrer-policy": "strict-origin-when-cross-origin", "strict-transport-security": "max-age=31536000; includeSubDomains", "x-content-type-options": "nosniff", - "x-ms-ests-server": "2.1.10732.8 - SCUS ProdSlices", - "x-ms-request-id": "6d3bcc30-fd00-4a68-b656-d0ea50cf0101" + "x-ms-ests-server": "2.1.11397.11 - SCUS ProdSlices", + "x-ms-request-id": "b976c21f-4b5c-4506-b46e-c91d1e1d0100" } }, { @@ -58,22 +57,21 @@ }, "requestBody": "{\"value\":\"value\",\"attributes\":{}}", "status": 200, - "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/fcd5a9e65a1042f4933e3edfff34d265\",\"attributes\":{\"enabled\":true,\"created\":1593089186,\"updated\":1593089186,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/93a8a8c9ee794f8b9052cc4e45a438d8\",\"attributes\":{\"enabled\":true,\"created\":1610495768,\"updated\":1610495768,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", "content-length": "339", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:26 GMT", + "date": "Tue, 12 Jan 2021 23:56:08 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "8465da4f-6a49-4277-8a9c-145dc037d5ce", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "c491197c-5cc9-45dd-84c8-a690ef770f05", "x-powered-by": "ASP.NET" } }, @@ -85,22 +83,21 @@ }, "requestBody": "{\"value\":\"value\",\"attributes\":{}}", "status": 200, - "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/da3274b3375b46ada33b9e61143c6d4f\",\"attributes\":{\"enabled\":true,\"created\":1593089186,\"updated\":1593089186,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"value\":\"value\",\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/1e5c1faf06e84ae2973c16380943ef05\",\"attributes\":{\"enabled\":true,\"created\":1610495768,\"updated\":1610495768,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", "content-length": "339", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:26 GMT", + "date": "Tue, 12 Jan 2021 23:56:09 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "a19a3ff5-e876-4769-bc07-ea79a99322df", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "eb0c99b7-db6f-4e4c-91a6-5b2fa292acee", "x-powered-by": "ASP.NET" } }, @@ -112,22 +109,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\",\"deletedDate\":1593089186,\"scheduledPurgeDate\":1600865186,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/fcd5a9e65a1042f4933e3edfff34d265\",\"attributes\":{\"enabled\":true,\"created\":1593089186,\"updated\":1593089186,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\",\"deletedDate\":1610495769,\"scheduledPurgeDate\":1618271769,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/93a8a8c9ee794f8b9052cc4e45a438d8\",\"attributes\":{\"enabled\":true,\"created\":1610495768,\"updated\":1610495768,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", "content-length": "551", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:26 GMT", + "date": "Tue, 12 Jan 2021 23:56:09 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "9e37c5fb-eb22-434c-930a-840c2b298fe2", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "d8b68600-cbb2-4fb3-b628-8593e5d49ff0", "x-powered-by": "ASP.NET" } }, @@ -142,19 +138,18 @@ "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\"}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "171", + "content-length": "170", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:26 GMT", + "date": "Tue, 12 Jan 2021 23:56:09 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "77a719d8-cebb-474c-8751-2d5cd40d639e", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "e94997dc-2f85-4da7-80b4-a6b2655a387d", "x-powered-by": "ASP.NET" } }, @@ -169,19 +164,18 @@ "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\"}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "171", + "content-length": "170", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:26 GMT", + "date": "Tue, 12 Jan 2021 23:56:09 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "5bf0fb62-a182-4c9a-aeeb-cc9b1430bd6a", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "43c026aa-b2d8-4890-b484-9e2b1cb3af64", "x-powered-by": "ASP.NET" } }, @@ -196,19 +190,18 @@ "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\"}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "171", + "content-length": "170", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:28 GMT", + "date": "Tue, 12 Jan 2021 23:56:11 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "61993ca4-5537-41bd-b9cb-72749d2f3090", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "3224d6a5-4c92-4c68-aac3-679497921a05", "x-powered-by": "ASP.NET" } }, @@ -223,73 +216,18 @@ "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\"}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "171", + "content-length": "170", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:30 GMT", + "date": "Tue, 12 Jan 2021 23:56:13 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "70e276b3-24ac-4544-bc50-b516d896400f", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "171", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:32 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "31b811da-93df-45e8-a8e1-0585d8471f68", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "171", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:35 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "21d442b2-b850-4068-bab6-5ad23cd4f763", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "23e5a9d4-83c6-4f29-9e2a-702c3f92cd77", "x-powered-by": "ASP.NET" } }, @@ -301,22 +239,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\",\"deletedDate\":1593089186,\"scheduledPurgeDate\":1600865186,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/fcd5a9e65a1042f4933e3edfff34d265\",\"attributes\":{\"enabled\":true,\"created\":1593089186,\"updated\":1593089186,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0\",\"deletedDate\":1610495769,\"scheduledPurgeDate\":1618271769,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/93a8a8c9ee794f8b9052cc4e45a438d8\",\"attributes\":{\"enabled\":true,\"created\":1610495768,\"updated\":1610495768,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", "content-length": "551", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:37 GMT", + "date": "Tue, 12 Jan 2021 23:56:15 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "3f38ace7-7548-4d3b-9a20-446f1c638aaf", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "2275f61a-d9de-40de-a1c9-0bb8cc465dbb", "x-powered-by": "ASP.NET" } }, @@ -331,17 +268,16 @@ "response": "", "responseHeaders": { "cache-control": "no-cache", - "date": "Thu, 25 Jun 2020 12:46:37 GMT", + "date": "Tue, 12 Jan 2021 23:56:15 GMT", "expires": "-1", "pragma": "no-cache", "status": "204", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "5c611090-9dd1-4322-8bf8-e97e36728456", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "5fc8c726-5474-4111-a924-68985623039a", "x-powered-by": "ASP.NET" } }, @@ -353,157 +289,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\",\"deletedDate\":1593089197,\"scheduledPurgeDate\":1600865197,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/da3274b3375b46ada33b9e61143c6d4f\",\"attributes\":{\"enabled\":true,\"created\":1593089186,\"updated\":1593089186,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\",\"deletedDate\":1610495775,\"scheduledPurgeDate\":1618271775,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/1e5c1faf06e84ae2973c16380943ef05\",\"attributes\":{\"enabled\":true,\"created\":1610495768,\"updated\":1610495768,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", "content-length": "551", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:37 GMT", + "date": "Tue, 12 Jan 2021 23:56:15 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "ecbe9716-76b7-4e7f-aa65-5b367df982e4", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "171", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:37 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "3e1d9900-d1d1-4c3f-b246-d97b23d0cd97", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "171", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:37 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "2a16b40d-4047-4051-b511-c26f2a03f6e0", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "171", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:39 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "d23fdc17-947d-4896-b78d-8f3c0ff7aa95", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "171", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:41 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", - "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", - "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "e25a4726-2abf-481b-a0a7-4c9db4feacbb", - "x-powered-by": "ASP.NET" - } - }, - { - "method": "GET", - "url": "https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1", - "query": { - "api-version": "7.1" - }, - "requestBody": null, - "status": 404, - "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", - "responseHeaders": { - "cache-control": "no-cache", - "content-length": "171", - "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:42 GMT", - "expires": "-1", - "pragma": "no-cache", - "status": "404", - "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "29737d22-fe63-4de1-a372-b0b309b394ed", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "8b81c910-d395-46ab-bb8a-77b98cfc5c84", "x-powered-by": "ASP.NET" } }, @@ -518,19 +318,18 @@ "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "171", + "content-length": "170", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:45 GMT", + "date": "Tue, 12 Jan 2021 23:56:15 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "fc29219f-0837-4eb3-828b-bd9304539d73", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "51558c4c-b5bf-45ea-aea2-be405d55fb64", "x-powered-by": "ASP.NET" } }, @@ -545,19 +344,18 @@ "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "171", + "content-length": "170", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:47 GMT", + "date": "Tue, 12 Jan 2021 23:56:15 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "b382b2a7-18b3-40f8-9b79-cc41f0d65b2d", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "78bf11c0-53fc-4c7f-a2a4-3bf598f09b16", "x-powered-by": "ASP.NET" } }, @@ -572,19 +370,18 @@ "response": "{\"error\":{\"code\":\"SecretNotFound\",\"message\":\"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\"}}", "responseHeaders": { "cache-control": "no-cache", - "content-length": "171", + "content-length": "170", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:49 GMT", + "date": "Tue, 12 Jan 2021 23:56:17 GMT", "expires": "-1", "pragma": "no-cache", "status": "404", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "60007586-039b-47b6-b10d-add9f3cb8b59", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "10b2d0a7-9f83-43e5-ae27-4fcd62a17aa0", "x-powered-by": "ASP.NET" } }, @@ -596,22 +393,21 @@ }, "requestBody": null, "status": 200, - "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\",\"deletedDate\":1593089197,\"scheduledPurgeDate\":1600865197,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/da3274b3375b46ada33b9e61143c6d4f\",\"attributes\":{\"enabled\":true,\"created\":1593089186,\"updated\":1593089186,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", + "response": "{\"recoveryId\":\"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1\",\"deletedDate\":1610495775,\"scheduledPurgeDate\":1618271775,\"id\":\"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/1e5c1faf06e84ae2973c16380943ef05\",\"attributes\":{\"enabled\":true,\"created\":1610495768,\"updated\":1610495768,\"recoveryLevel\":\"Recoverable+Purgeable\",\"recoverableDays\":90}}", "responseHeaders": { "cache-control": "no-cache", "content-length": "551", "content-type": "application/json; charset=utf-8", - "date": "Thu, 25 Jun 2020 12:46:51 GMT", + "date": "Tue, 12 Jan 2021 23:56:19 GMT", "expires": "-1", "pragma": "no-cache", "status": "200", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "49bc122f-6f3b-45ed-9c90-77f8699ba7ef", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "a0585b26-e475-4884-a12d-c32e8d180f72", "x-powered-by": "ASP.NET" } }, @@ -626,17 +422,16 @@ "response": "", "responseHeaders": { "cache-control": "no-cache", - "date": "Thu, 25 Jun 2020 12:46:51 GMT", + "date": "Tue, 12 Jan 2021 23:56:19 GMT", "expires": "-1", "pragma": "no-cache", "status": "204", "strict-transport-security": "max-age=31536000;includeSubDomains", - "x-aspnet-version": "4.0.30319", "x-content-type-options": "nosniff", - "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;", + "x-ms-keyvault-network-info": "conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;", "x-ms-keyvault-region": "westus", - "x-ms-keyvault-service-version": "1.1.6.0", - "x-ms-request-id": "f4d4706b-7c56-412b-8ab2-60343340908f", + "x-ms-keyvault-service-version": "1.2.99.0", + "x-ms-request-id": "fd2d479c-2d29-45d8-b7d0-9ddd84ddcb14", "x-powered-by": "ASP.NET" } } @@ -645,5 +440,5 @@ "uniqueName": {}, "newDate": {} }, - "hash": "b44e734863dcf09a7139f54575f60660" + "hash": "7f670821acfdcbe30c675dd6561efa2e" } \ No newline at end of file diff --git a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.json b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.json index e238042bb3fa..0e63f4e37197 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.json +++ b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.json @@ -4,5 +4,5 @@ "uniqueName": {}, "newDate": {} }, - "hash": "6458038d8c1025409dcf055c21298660" + "hash": "4c2941d77cb8f7406feb79949e7384a4" } \ No newline at end of file diff --git a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.json b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.json index aff2cc4d226c..700f39ceb583 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.json +++ b/sdk/keyvault/keyvault-secrets/recordings/browsers/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.json @@ -4,5 +4,5 @@ "uniqueName": {}, "newDate": {} }, - "hash": "07e144eb5260cadf12b1fb5ccd596c83" + "hash": "8c1687bf2a2ab56f86e3c6374ac8592c" } \ No newline at end of file diff --git a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.js b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.js index 833e1f9aa01e..92e365793f48 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.js +++ b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_authentication_should_work_for_parallel_requests.js @@ -1,6 +1,6 @@ let nock = require('nock'); -module.exports.hash = "ae5acde324a54ee4817fbd4478c7aea0"; +module.exports.hash = "2ccaf8dec5e25a1193a8d92477b56725"; module.exports.testInfo = {"uniqueName":{},"newDate":{}} @@ -23,13 +23,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '180b453d-2508-4968-9ee3-0c737e589019', + '6947d10a-8f1a-4dcc-b5a2-525114884133', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -37,7 +35,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT' + 'Tue, 12 Jan 2021 23:54:45 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -59,13 +57,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '64e0729b-a5a1-40bb-b195-87cbe402f478', + '7ce5ac51-62e7-459c-acaa-3f2e98c6a9e9', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -73,14 +69,14 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT' + 'Tue, 12 Jan 2021 23:54:46 GMT' ]); nock('https://login.microsoftonline.com:443', {"encodedQueryParams":true}) .post('/azure_tenant_id/oauth2/v2.0/token', "response_type=token&grant_type=client_credentials&client_id=azure_client_id&client_secret=azure_client_secret&scope=https%3A%2F%2Fvault.azure.net%2F.default") .reply(200, {"token_type":"Bearer","expires_in":86399,"ext_expires_in":86399,"access_token":"access_token"}, [ 'Cache-Control', - 'no-cache, no-store', + 'no-store, no-cache', 'Pragma', 'no-cache', 'Content-Type', @@ -91,20 +87,20 @@ nock('https://login.microsoftonline.com:443', {"encodedQueryParams":true}) 'max-age=31536000; includeSubDomains', 'X-Content-Type-Options', 'nosniff', - 'x-ms-request-id', - '9cdca69b-c9b1-4e00-8f69-beaab2f11701', - 'x-ms-ests-server', - '2.1.10732.8 - NCUS ProdSlices', 'P3P', 'CP="DSP CUR OTPi IND OTRi ONL FIN"', + 'x-ms-request-id', + 'b273d4e6-5be7-43e2-b53e-4ec321270000', + 'x-ms-ests-server', + '2.1.11397.11 - EUS ProdSlices', 'Set-Cookie', - 'fpc=AuUKnskyC-lPiLn5iF5hPuA_aSJHAQAAAJWGhtYOAAAA; expires=Sat, 25-Jul-2020 11:50:45 GMT; path=/; secure; HttpOnly; SameSite=None', + 'fpc=Ajcwt9AlHdpAoCjJlpuXOEo_aSJHAQAAAMYtkNcOAAAA; expires=Thu, 11-Feb-2021 23:54:46 GMT; path=/; secure; HttpOnly; SameSite=None', 'Set-Cookie', - 'x-ms-gateway-slice=estsfd; path=/; SameSite=None; secure; HttpOnly', + 'x-ms-gateway-slice=estsfd; path=/; secure; samesite=none; httponly', 'Set-Cookie', - 'stsservicecookie=estsfd; path=/; SameSite=None; secure; HttpOnly', + 'stsservicecookie=estsfd; path=/; secure; samesite=none; httponly', 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT', + 'Tue, 12 Jan 2021 23:54:46 GMT', 'Content-Length', '1315' ]); @@ -113,7 +109,7 @@ nock('https://login.microsoftonline.com:443', {"encodedQueryParams":true}) .post('/azure_tenant_id/oauth2/v2.0/token', "response_type=token&grant_type=client_credentials&client_id=azure_client_id&client_secret=azure_client_secret&scope=https%3A%2F%2Fvault.azure.net%2F.default") .reply(200, {"token_type":"Bearer","expires_in":86399,"ext_expires_in":86399,"access_token":"access_token"}, [ 'Cache-Control', - 'no-cache, no-store', + 'no-store, no-cache', 'Pragma', 'no-cache', 'Content-Type', @@ -124,62 +120,28 @@ nock('https://login.microsoftonline.com:443', {"encodedQueryParams":true}) 'max-age=31536000; includeSubDomains', 'X-Content-Type-Options', 'nosniff', - 'x-ms-request-id', - '9bf5f106-615c-4d4e-bf04-c87c85831d00', - 'x-ms-ests-server', - '2.1.10732.8 - SCUS ProdSlices', 'P3P', 'CP="DSP CUR OTPi IND OTRi ONL FIN"', + 'x-ms-request-id', + 'c3d50aa8-9557-4f35-bf0a-87e576c90300', + 'x-ms-ests-server', + '2.1.11397.11 - WUS2 ProdSlices', 'Set-Cookie', - 'fpc=AoaS8gvHPepNih67Z4ABzNk_aSJHAQAAAJSGhtYOAAAA; expires=Sat, 25-Jul-2020 11:50:45 GMT; path=/; secure; HttpOnly; SameSite=None', + 'fpc=AsRmkemMnMlCq1z48Ztaqlw_aSJHAQAAAMYtkNcOAAAA; expires=Thu, 11-Feb-2021 23:54:46 GMT; path=/; secure; HttpOnly; SameSite=None', 'Set-Cookie', - 'x-ms-gateway-slice=estsfd; path=/; SameSite=None; secure; HttpOnly', + 'x-ms-gateway-slice=estsfd; path=/; secure; samesite=none; httponly', 'Set-Cookie', - 'stsservicecookie=estsfd; path=/; SameSite=None; secure; HttpOnly', + 'stsservicecookie=estsfd; path=/; secure; samesite=none; httponly', 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT', + 'Tue, 12 Jan 2021 23:54:45 GMT', 'Content-Length', '1315' ]); -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .put('/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1', {"value":"value","attributes":{}}) - .query(true) - .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/dc711091e17348289443c80bbbb21b66","attributes":{"enabled":true,"created":1593085845,"updated":1593085845,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - 'e04013d9-013d-4d15-8856-3c33b4ed2b43', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT', - 'Content-Length', - '329' -]); - nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .put('/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0', {"value":"value","attributes":{}}) .query(true) - .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/2d3f913fb8ec4c2c85d9f2be2772d58a","attributes":{"enabled":true,"created":1593085845,"updated":1593085845,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/8241c1a175a6408c92017dfc9a4de89f","attributes":{"enabled":true,"created":1610495686,"updated":1610495686,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -191,13 +153,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '86a7d954-b970-400e-8c7e-55832f1a13bd', + 'e7f9b493-efac-4256-96b7-e4d2948f049f', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -205,89 +165,19 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT', - 'Content-Length', - '329' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .delete('/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') - .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0","deletedDate":1593085845,"scheduledPurgeDate":1600861845,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/2d3f913fb8ec4c2c85d9f2be2772d58a","attributes":{"enabled":true,"created":1593085845,"updated":1593085845,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '51197dde-4338-4bed-b606-f27ba0686880', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT', - 'Content-Length', - '531' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', + 'Tue, 12 Jan 2021 23:54:46 GMT', 'Content-Length', - '161', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '8d58470e-c25f-47e1-87d0-950628aee21c', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:45 GMT' + '330' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') + .put('/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1', {"value":"value","attributes":{}}) .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0"}}, [ + .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/e22bc76de3664678ac018cb2b634dce0","attributes":{"enabled":true,"created":1610495686,"updated":1610495686,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', 'no-cache', - 'Content-Length', - '161', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -295,13 +185,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '2dfb0d76-cbac-45f8-a9d8-c84945060409', + '693ce5a1-c2cb-4cb3-9217-55cc98e978e7', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -309,53 +197,19 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:46 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', + 'Tue, 12 Jan 2021 23:54:46 GMT', 'Content-Length', - '161', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '746194ee-8fb3-456b-9c07-d9da0d398be0', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:48 GMT' + '330' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') + .delete('/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0"}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0","deletedDate":1610495686,"scheduledPurgeDate":1618271686,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/8241c1a175a6408c92017dfc9a4de89f","attributes":{"enabled":true,"created":1610495686,"updated":1610495686,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', 'no-cache', - 'Content-Length', - '161', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -363,13 +217,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '10af227c-f776-44ba-8e23-3629231de579', + '63c32438-e9f8-487a-8142-0344598d216b', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -377,41 +229,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:50 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', + 'Tue, 12 Jan 2021 23:54:46 GMT', 'Content-Length', - '161', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '8a791219-a646-4efe-990a-ace815128686', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:52 GMT' + '533' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -431,13 +251,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'fb65fabb-92e9-4350-9185-8e419df9b6a3', + '6bc09caf-473d-4d00-bede-e23ddc49d588', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -445,7 +263,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:54 GMT' + 'Tue, 12 Jan 2021 23:54:46 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -465,13 +283,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '0e831b15-8b86-4a99-95e3-d3b823f55895', + '90f7d7f1-1a18-468e-a423-57bb50e1e707', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -479,7 +295,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:56 GMT' + 'Tue, 12 Jan 2021 23:54:46 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -499,13 +315,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '00d7e372-b207-48eb-bed7-a8f29e235c0e', + 'd470ace5-07f5-4879-9de0-b7daa3a7ef41', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -513,7 +327,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:58 GMT' + 'Tue, 12 Jan 2021 23:54:48 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -533,13 +347,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'e93031fd-1317-4905-a044-fdf461a8e57a', + 'a40d36f0-55ee-4dd2-84f9-84db2735b494', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -547,13 +359,13 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:00 GMT' + 'Tue, 12 Jan 2021 23:54:50 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0') .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0","deletedDate":1593085845,"scheduledPurgeDate":1600861845,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/2d3f913fb8ec4c2c85d9f2be2772d58a","attributes":{"enabled":true,"created":1593085845,"updated":1593085845,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0","deletedDate":1610495686,"scheduledPurgeDate":1618271686,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--0/8241c1a175a6408c92017dfc9a4de89f","attributes":{"enabled":true,"created":1610495686,"updated":1610495686,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -565,13 +377,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '8c138ebb-9d6b-4b1e-abb5-9ca206b5fe98', + 'fd860d21-aa61-4e73-92cb-f30e9abf62d4', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -579,9 +389,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:02 GMT', + 'Tue, 12 Jan 2021 23:54:52 GMT', 'Content-Length', - '531' + '533' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -597,13 +407,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '2b216aed-2004-4462-8d3d-e7a94d51b2b4', + 'af391e3b-ae22-4a31-b94f-800d90d2149b', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -611,121 +419,17 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:02 GMT' + 'Tue, 12 Jan 2021 23:54:52 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .delete('/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1') .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1","deletedDate":1593085863,"scheduledPurgeDate":1600861863,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/dc711091e17348289443c80bbbb21b66","attributes":{"enabled":true,"created":1593085845,"updated":1593085845,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '6b03da2a-f8a6-4375-8791-7ff4794c2147', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:51:03 GMT', - 'Content-Length', - '531' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '161', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - 'dbf060cb-3efe-4b22-9e86-10439e20a550', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:51:02 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '161', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '907d89cd-72cd-4170-8b08-f5dc9331f336', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:51:03 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1"}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1","deletedDate":1610495693,"scheduledPurgeDate":1618271693,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/e22bc76de3664678ac018cb2b634dce0","attributes":{"enabled":true,"created":1610495686,"updated":1610495686,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', 'no-cache', - 'Content-Length', - '161', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -733,13 +437,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'd7f36897-e466-4046-82fc-003e1f168b69', + 'a95120d2-3a45-44b1-b211-524321af868d', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -747,41 +449,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:04 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', + 'Tue, 12 Jan 2021 23:54:52 GMT', 'Content-Length', - '161', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '06ad9faf-9c93-40e1-ba6e-31beffe1cc4f', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:51:07 GMT' + '533' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -801,13 +471,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '875b319e-2981-4e87-9449-c3592c1121fd', + '20900810-017a-4f52-b87f-8b688276bb09', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -815,7 +483,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:09 GMT' + 'Tue, 12 Jan 2021 23:54:52 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -835,13 +503,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '883769d3-fb3c-4ff3-8b70-9eae45b536f3', + 'e69046a7-7d6c-42c1-9300-9a4e5899d37e', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -849,7 +515,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:11 GMT' + 'Tue, 12 Jan 2021 23:54:52 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -869,13 +535,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '86f64ee0-1457-447d-b4b9-86acdebcadb7', + '87de4f67-7732-4624-bc38-1baa002c181a', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -883,7 +547,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:13 GMT' + 'Tue, 12 Jan 2021 23:54:54 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -903,13 +567,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'b90e5d0c-e9e3-4537-8771-de23d89cd80c', + '73dbc9d4-a458-42b3-8813-f4d2f7a38eab', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -917,13 +579,13 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:15 GMT' + 'Tue, 12 Jan 2021 23:54:57 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .get('/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1') .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1","deletedDate":1593085863,"scheduledPurgeDate":1600861863,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/dc711091e17348289443c80bbbb21b66","attributes":{"enabled":true,"created":1593085845,"updated":1593085845,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1","deletedDate":1610495693,"scheduledPurgeDate":1618271693,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Authenticationshouldworkforparallelrequests--1/e22bc76de3664678ac018cb2b634dce0","attributes":{"enabled":true,"created":1610495686,"updated":1610495686,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -935,13 +597,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '7119f65b-d1a1-4f6b-b489-c6e01e90864c', + '3ac4a8ab-3f49-4526-b5b0-6f84924c8831', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -949,9 +609,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:17 GMT', + 'Tue, 12 Jan 2021 23:54:59 GMT', 'Content-Length', - '531' + '533' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -967,13 +627,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '88c13e55-cead-41d7-9734-c9b644675f31', + 'a4876ec2-d3d4-4ac7-ad99-a7e4b4cbfef3', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -981,5 +639,5 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:51:17 GMT' + 'Tue, 12 Jan 2021 23:54:59 GMT' ]); diff --git a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.js b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.js index f6a636cb7546..9188292d408e 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.js +++ b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests/recording_once_authenticated_new_requests_should_not_authenticate_again.js @@ -1,6 +1,6 @@ let nock = require('nock'); -module.exports.hash = "fb426644dd9ca128b613101d751a2483"; +module.exports.hash = "70790a18aaeb1a04173b3d837c8ec76b"; module.exports.testInfo = {"uniqueName":{},"newDate":{}} @@ -23,13 +23,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '2b780b27-3418-443b-bf68-e38e1d306423', + 'a78f3a71-526d-4c0a-b0e3-19656c71c2a8', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -37,14 +35,14 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:14 GMT' + 'Tue, 12 Jan 2021 23:54:59 GMT' ]); nock('https://login.microsoftonline.com:443', {"encodedQueryParams":true}) .post('/azure_tenant_id/oauth2/v2.0/token', "response_type=token&grant_type=client_credentials&client_id=azure_client_id&client_secret=azure_client_secret&scope=https%3A%2F%2Fvault.azure.net%2F.default") .reply(200, {"token_type":"Bearer","expires_in":86399,"ext_expires_in":86399,"access_token":"access_token"}, [ 'Cache-Control', - 'no-cache, no-store', + 'no-store, no-cache', 'Pragma', 'no-cache', 'Content-Type', @@ -55,20 +53,20 @@ nock('https://login.microsoftonline.com:443', {"encodedQueryParams":true}) 'max-age=31536000; includeSubDomains', 'X-Content-Type-Options', 'nosniff', - 'x-ms-request-id', - 'db0b0ae0-d827-46bc-8bf9-9c2171144601', - 'x-ms-ests-server', - '2.1.10732.8 - WUS2 ProdSlices', 'P3P', 'CP="DSP CUR OTPi IND OTRi ONL FIN"', + 'x-ms-request-id', + '41b5a1a1-012f-4f74-972f-c4b9604e0400', + 'x-ms-ests-server', + '2.1.11397.11 - WUS2 ProdSlices', 'Set-Cookie', - 'fpc=AiAvp6CiOMlCueEXwIKAeN0_aSJHAQAAAHaGhtYOAAAA; expires=Sat, 25-Jul-2020 11:50:15 GMT; path=/; secure; HttpOnly; SameSite=None', + 'fpc=AsRmkemMnMlCq1z48Ztaqlw_aSJHAgAAAMYtkNcOAAAA; expires=Thu, 11-Feb-2021 23:55:00 GMT; path=/; secure; HttpOnly; SameSite=None', 'Set-Cookie', - 'x-ms-gateway-slice=estsfd; path=/; SameSite=None; secure; HttpOnly', + 'x-ms-gateway-slice=estsfd; path=/; secure; samesite=none; httponly', 'Set-Cookie', - 'stsservicecookie=estsfd; path=/; SameSite=None; secure; HttpOnly', + 'stsservicecookie=estsfd; path=/; secure; samesite=none; httponly', 'Date', - 'Thu, 25 Jun 2020 11:50:14 GMT', + 'Tue, 12 Jan 2021 23:54:59 GMT', 'Content-Length', '1315' ]); @@ -76,7 +74,7 @@ nock('https://login.microsoftonline.com:443', {"encodedQueryParams":true}) nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .put('/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0', {"value":"value","attributes":{}}) .query(true) - .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/d0dc48726ef74917a380be2cac9e7bc9","attributes":{"enabled":true,"created":1593085815,"updated":1593085815,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/438c4bdb02114e7bae442fe5d9dc3242","attributes":{"enabled":true,"created":1610495700,"updated":1610495700,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -88,13 +86,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '719275e0-8e7c-4e5a-bf6e-676ca50418ed', + 'c6d70335-883d-409d-8cb2-e7d99a8e24e1', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -102,15 +98,15 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:14 GMT', + 'Tue, 12 Jan 2021 23:54:59 GMT', 'Content-Length', - '339' + '341' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .put('/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1', {"value":"value","attributes":{}}) .query(true) - .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/9df85f4564d64c8289b046d2d17823d8","attributes":{"enabled":true,"created":1593085815,"updated":1593085815,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"value":"value","id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/b91f02a059c640d28f86f9e2832c076c","attributes":{"enabled":true,"created":1610495700,"updated":1610495700,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -122,13 +118,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '97f8893e-1050-4a28-9cc1-f91542caf8c2', + '74be487a-a19d-402c-a559-854ebadb45a9', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -136,15 +130,15 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:14 GMT', + 'Tue, 12 Jan 2021 23:55:00 GMT', 'Content-Length', - '339' + '341' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .delete('/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0') .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0","deletedDate":1593085815,"scheduledPurgeDate":1600861815,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/d0dc48726ef74917a380be2cac9e7bc9","attributes":{"enabled":true,"created":1593085815,"updated":1593085815,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0","deletedDate":1610495700,"scheduledPurgeDate":1618271700,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/438c4bdb02114e7bae442fe5d9dc3242","attributes":{"enabled":true,"created":1610495700,"updated":1610495700,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -156,13 +150,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'f2e265cd-6553-439b-900f-0d81c5aed979', + 'a6f8306f-57f0-4c11-8545-991e63efa9e3', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -170,179 +162,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:14 GMT', - 'Content-Length', - '551' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '516e7e1c-b2b0-4eb6-a929-f55a3a0cec2e', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:14 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '1b84c5bb-5be7-4d25-81e3-91efab90dca9', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:15 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', + 'Tue, 12 Jan 2021 23:55:00 GMT', 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '84586f9e-f20c-4a25-9b69-4ca1545f70a8', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:16 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '06e518ca-2594-46af-a159-8199af1f1c4f', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:19 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '895e8720-9513-4f01-b3fe-99bcd6439dde', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:21 GMT' + '555' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -354,7 +176,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'Pragma', 'no-cache', 'Content-Length', - '171', + '172', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -362,13 +184,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '39f774e8-44e6-4527-b967-ec18a3fe578c', + '4b3e18af-779a-4681-81e8-7d389dae9950', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -376,7 +196,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:23 GMT' + 'Tue, 12 Jan 2021 23:55:00 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -388,7 +208,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'Pragma', 'no-cache', 'Content-Length', - '171', + '172', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -396,13 +216,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'ca4a3986-bf51-4439-b20e-23faf354c6ce', + '9b6fe71c-4b05-4c65-9d18-f583a3b17833', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -410,7 +228,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:25 GMT' + 'Tue, 12 Jan 2021 23:55:00 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -422,7 +240,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'Pragma', 'no-cache', 'Content-Length', - '171', + '172', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -430,13 +248,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '15b48e34-b1b3-4bdc-8bd2-39dd24cbc966', + '7ad9c869-67a4-4c50-b244-f662d62991b9', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -444,13 +260,13 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:28 GMT' + 'Tue, 12 Jan 2021 23:55:02 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0') .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0","deletedDate":1593085815,"scheduledPurgeDate":1600861815,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/d0dc48726ef74917a380be2cac9e7bc9","attributes":{"enabled":true,"created":1593085815,"updated":1593085815,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0","deletedDate":1610495700,"scheduledPurgeDate":1618271700,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--0/438c4bdb02114e7bae442fe5d9dc3242","attributes":{"enabled":true,"created":1610495700,"updated":1610495700,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -462,13 +278,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'f928df75-49ad-439a-845a-b6b961eb402a', + '1531dc9a-c4b4-46d1-9f64-a077912cdc0e', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -476,9 +290,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:30 GMT', + 'Tue, 12 Jan 2021 23:55:04 GMT', 'Content-Length', - '551' + '555' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -494,13 +308,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'aaf746bc-3625-46fd-a1bb-e4655c7f5824', + '79c52f91-2796-45ad-845f-f2ecf6658213', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -508,13 +320,13 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:30 GMT' + 'Tue, 12 Jan 2021 23:55:05 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .delete('/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1') .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1","deletedDate":1593085830,"scheduledPurgeDate":1600861830,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/9df85f4564d64c8289b046d2d17823d8","attributes":{"enabled":true,"created":1593085815,"updated":1593085815,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1","deletedDate":1610495705,"scheduledPurgeDate":1618271705,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/b91f02a059c640d28f86f9e2832c076c","attributes":{"enabled":true,"created":1610495700,"updated":1610495700,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -526,13 +338,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '8f48bb4d-1c11-4d4c-bea1-a9e85508d7cf', + '442fef4b-07db-4b0d-9ae2-3893be44d66f', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -540,179 +350,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:30 GMT', - 'Content-Length', - '551' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', + 'Tue, 12 Jan 2021 23:55:04 GMT', 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '028ac525-c114-4acf-9b29-a5f063054162', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:30 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '94914c6d-3d86-4152-89df-31c5a23a2c9a', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:30 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - 'a206d666-bfcf-4e69-9284-0c1acd189705', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:32 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '50435d03-d71f-4345-92c7-94b9a7e232b5', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:34 GMT' -]); - -nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) - .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1') - .query(true) - .reply(404, {"error":{"code":"SecretNotFound","message":"Deleted Secret not found: challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1"}}, [ - 'Cache-Control', - 'no-cache', - 'Pragma', - 'no-cache', - 'Content-Length', - '171', - 'Content-Type', - 'application/json; charset=utf-8', - 'Expires', - '-1', - 'x-ms-keyvault-region', - 'westus', - 'x-ms-request-id', - '55b77212-c9e7-4723-b5d8-c451bde2c91b', - 'x-ms-keyvault-service-version', - '1.1.6.0', - 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', - 'X-Powered-By', - 'ASP.NET', - 'Strict-Transport-Security', - 'max-age=31536000;includeSubDomains', - 'X-Content-Type-Options', - 'nosniff', - 'Date', - 'Thu, 25 Jun 2020 11:50:36 GMT' + '555' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -724,7 +364,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'Pragma', 'no-cache', 'Content-Length', - '171', + '172', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -732,13 +372,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '6a17d930-3768-4075-b4e3-79049569596f', + '4f775b4d-c9dd-45e0-bcd7-9724b1f3b443', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -746,7 +384,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:38 GMT' + 'Tue, 12 Jan 2021 23:55:05 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -758,7 +396,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'Pragma', 'no-cache', 'Content-Length', - '171', + '172', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -766,13 +404,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'bfee2e35-377d-4f90-8df2-737bcc7a251d', + '50b486f9-be3e-4a7b-8603-893a0cd318ca', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -780,7 +416,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:39 GMT' + 'Tue, 12 Jan 2021 23:55:04 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -792,7 +428,7 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'Pragma', 'no-cache', 'Content-Length', - '171', + '172', 'Content-Type', 'application/json; charset=utf-8', 'Expires', @@ -800,13 +436,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'd518ac3a-5b1e-4fa5-8372-d6b81584ea65', + '2785faf8-f74e-4f23-8746-e315c774a2ef', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -814,13 +448,13 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:42 GMT' + 'Tue, 12 Jan 2021 23:55:07 GMT' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) .get('/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1') .query(true) - .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1","deletedDate":1593085830,"scheduledPurgeDate":1600861830,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/9df85f4564d64c8289b046d2d17823d8","attributes":{"enabled":true,"created":1593085815,"updated":1593085815,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ + .reply(200, {"recoveryId":"https://keyvault_name.vault.azure.net/deletedsecrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1","deletedDate":1610495705,"scheduledPurgeDate":1618271705,"id":"https://keyvault_name.vault.azure.net/secrets/challengeAuthSecretName-Onceauthenticatednewrequestsshouldnotauthenticateagain--1/b91f02a059c640d28f86f9e2832c076c","attributes":{"enabled":true,"created":1610495700,"updated":1610495700,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}, [ 'Cache-Control', 'no-cache', 'Pragma', @@ -832,13 +466,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - 'ee130ab9-bcef-4fee-abb0-ac674bc5d0f8', + '35ee4eb1-15d5-429a-8ddb-932eacbcf2d1', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -846,9 +478,9 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:44 GMT', + 'Tue, 12 Jan 2021 23:55:09 GMT', 'Content-Length', - '551' + '555' ]); nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) @@ -864,13 +496,11 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'x-ms-keyvault-region', 'westus', 'x-ms-request-id', - '12700c6b-f333-4ca8-a2cd-07caab206222', + '0d58a2ee-6aa3-43e2-8298-1ca5564faaf1', 'x-ms-keyvault-service-version', - '1.1.6.0', + '1.2.99.0', 'x-ms-keyvault-network-info', - 'conn_type=Ipv4;addr=51.141.175.151;act_addr_fam=InterNetwork;', - 'X-AspNet-Version', - '4.0.30319', + 'conn_type=Ipv4;addr=76.121.141.80;act_addr_fam=InterNetwork;', 'X-Powered-By', 'ASP.NET', 'Strict-Transport-Security', @@ -878,5 +508,5 @@ nock('https://keyvault_name.vault.azure.net:443', {"encodedQueryParams":true}) 'X-Content-Type-Options', 'nosniff', 'Date', - 'Thu, 25 Jun 2020 11:50:44 GMT' + 'Tue, 12 Jan 2021 23:55:09 GMT' ]); diff --git a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.js b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.js index 4a0e8a3b0ee8..5dc75e501f0b 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.js +++ b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_skip_unexpected_properties_on_the_wwwauthenticate_header.js @@ -1,5 +1,5 @@ let nock = require('nock'); -module.exports.hash = "a4c0302591ac2a3ba24bf059840f44b5"; +module.exports.hash = "e4cd22190bf60b2ec17d3d42e484410f"; module.exports.testInfo = {"uniqueName":{},"newDate":{}} diff --git a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.js b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.js index e8b1d7855489..b4cf4f03133a 100644 --- a/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.js +++ b/sdk/keyvault/keyvault-secrets/recordings/node/challenge_based_authentication_tests_parsewwwauthenticate_tests/recording_should_work_for_known_shapes_of_the_wwwauthenticate_header.js @@ -1,5 +1,5 @@ let nock = require('nock'); -module.exports.hash = "d3e6ee11591a0825c0401d60b83a6d75"; +module.exports.hash = "983f2879da70c07c71732e17c7bf60b8"; module.exports.testInfo = {"uniqueName":{},"newDate":{}} diff --git a/sdk/keyvault/keyvault-secrets/review/keyvault-secrets.api.md b/sdk/keyvault/keyvault-secrets/review/keyvault-secrets.api.md index 5cfbdb7c4e4c..d283d6bbcbaf 100644 --- a/sdk/keyvault/keyvault-secrets/review/keyvault-secrets.api.md +++ b/sdk/keyvault/keyvault-secrets/review/keyvault-secrets.api.md @@ -36,7 +36,7 @@ export interface DeletedSecret { } // @public -export type DeletionRecoveryLevel = 'Purgeable' | 'Recoverable+Purgeable' | 'Recoverable' | 'Recoverable+ProtectedSubscription' | 'CustomizedRecoverable+Purgeable' | 'CustomizedRecoverable' | 'CustomizedRecoverable+ProtectedSubscription'; +export type DeletionRecoveryLevel = string; // @public export interface GetDeletedSecretOptions extends coreHttp.OperationOptions { @@ -62,6 +62,17 @@ export interface KeyVaultSecretId { version?: string; } +// @public +export const enum KnownDeletionRecoveryLevel { + CustomizedRecoverable = "CustomizedRecoverable", + CustomizedRecoverableProtectedSubscription = "CustomizedRecoverable+ProtectedSubscription", + CustomizedRecoverablePurgeable = "CustomizedRecoverable+Purgeable", + Purgeable = "Purgeable", + Recoverable = "Recoverable", + RecoverableProtectedSubscription = "Recoverable+ProtectedSubscription", + RecoverablePurgeable = "Recoverable+Purgeable" +} + // @public export interface ListDeletedSecretsOptions extends coreHttp.OperationOptions { } diff --git a/sdk/keyvault/keyvault-secrets/src/generated/index.ts b/sdk/keyvault/keyvault-secrets/src/generated/index.ts new file mode 100644 index 000000000000..1ed0b66df617 --- /dev/null +++ b/sdk/keyvault/keyvault-secrets/src/generated/index.ts @@ -0,0 +1,11 @@ +/* + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. + * + * Code generated by Microsoft (R) AutoRest Code Generator. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. + */ + +export * from "./models"; +export { KeyVaultClient } from "./keyVaultClient"; +export { KeyVaultClientContext } from "./keyVaultClientContext"; diff --git a/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClient.ts b/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClient.ts index 3fa19da31748..bc4c16d6840d 100644 --- a/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClient.ts +++ b/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClient.ts @@ -1,482 +1,414 @@ /* - * Copyright (c) Microsoft Corporation. All rights reserved. - * Licensed under the MIT License. See License.txt in the project root for - * license information. + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. * * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ import * as coreHttp from "@azure/core-http"; -import * as Models from "./models"; -import * as Mappers from "./models/mappers"; import * as Parameters from "./models/parameters"; +import * as Mappers from "./models/mappers"; import { KeyVaultClientContext } from "./keyVaultClientContext"; +import { + KeyVaultClientOptionalParams, + ApiVersion72Preview, + KeyVaultClientSetSecretOptionalParams, + KeyVaultClientSetSecretResponse, + KeyVaultClientDeleteSecretResponse, + KeyVaultClientUpdateSecretOptionalParams, + KeyVaultClientUpdateSecretResponse, + KeyVaultClientGetSecretResponse, + KeyVaultClientGetSecretsOptionalParams, + KeyVaultClientGetSecretsResponse, + KeyVaultClientGetSecretVersionsOptionalParams, + KeyVaultClientGetSecretVersionsResponse, + KeyVaultClientGetDeletedSecretsOptionalParams, + KeyVaultClientGetDeletedSecretsResponse, + KeyVaultClientGetDeletedSecretResponse, + KeyVaultClientRecoverDeletedSecretResponse, + KeyVaultClientBackupSecretResponse, + KeyVaultClientRestoreSecretResponse, + KeyVaultClientGetSecretsNextOptionalParams, + KeyVaultClientGetSecretsNextResponse, + KeyVaultClientGetSecretVersionsNextOptionalParams, + KeyVaultClientGetSecretVersionsNextResponse, + KeyVaultClientGetDeletedSecretsNextOptionalParams, + KeyVaultClientGetDeletedSecretsNextResponse +} from "./models"; -class KeyVaultClient extends KeyVaultClientContext { +/** @hidden */ +export class KeyVaultClient extends KeyVaultClientContext { /** * Initializes a new instance of the KeyVaultClient class. - * @param apiVersion Client API version. - * @param [options] The parameter options + * @param apiVersion Api Version + * @param options The parameter options */ - constructor(apiVersion: string, options?: coreHttp.ServiceClientOptions) { + constructor( + apiVersion: ApiVersion72Preview, + options?: KeyVaultClientOptionalParams + ) { super(apiVersion, options); } /** - * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, - * Azure Key Vault creates a new version of that secret. This operation requires the secrets/set - * permission. - * @summary Sets a secret in a specified key vault. - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param value The value of the secret. - * @param [options] The optional parameters - * @returns Promise - */ - setSecret(vaultBaseUrl: string, secretName: string, value: string, options?: Models.KeyVaultClientSetSecretOptionalParams): Promise; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param value The value of the secret. - * @param callback The callback - */ - setSecret(vaultBaseUrl: string, secretName: string, value: string, callback: coreHttp.ServiceCallback): void; - /** + * The SET operation adds a secret to the Azure Key Vault. If the named secret already exists, Azure + * Key Vault creates a new version of that secret. This operation requires the secrets/set permission. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. * @param value The value of the secret. - * @param options The optional parameters - * @param callback The callback - */ - setSecret(vaultBaseUrl: string, secretName: string, value: string, options: Models.KeyVaultClientSetSecretOptionalParams, callback: coreHttp.ServiceCallback): void; - setSecret(vaultBaseUrl: string, secretName: string, value: string, options?: Models.KeyVaultClientSetSecretOptionalParams | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + setSecret( + vaultBaseUrl: string, + secretName: string, + value: string, + options?: KeyVaultClientSetSecretOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + value, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - value, - options - }, - setSecretOperationSpec, - callback) as Promise; + operationArguments, + setSecretOperationSpec + ) as Promise; } /** - * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied - * to an individual version of a secret. This operation requires the secrets/delete permission. - * @summary Deletes a secret from a specified key vault. + * The DELETE operation applies to any secret stored in Azure Key Vault. DELETE cannot be applied to an + * individual version of a secret. This operation requires the secrets/delete permission. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param [options] The optional parameters - * @returns Promise - */ - deleteSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase): Promise; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param callback The callback - */ - deleteSecret(vaultBaseUrl: string, secretName: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param options The optional parameters - * @param callback The callback - */ - deleteSecret(vaultBaseUrl: string, secretName: string, options: coreHttp.RequestOptionsBase, callback: coreHttp.ServiceCallback): void; - deleteSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + deleteSecret( + vaultBaseUrl: string, + secretName: string, + options?: coreHttp.OperationOptions + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - options - }, - deleteSecretOperationSpec, - callback) as Promise; + operationArguments, + deleteSecretOperationSpec + ) as Promise; } /** - * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that - * are not specified in the request are left unchanged. The value of a secret itself cannot be - * changed. This operation requires the secrets/set permission. - * @summary Updates the attributes associated with a specified secret in a given key vault. + * The UPDATE operation changes specified attributes of an existing stored secret. Attributes that are + * not specified in the request are left unchanged. The value of a secret itself cannot be changed. + * This operation requires the secrets/set permission. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. * @param secretVersion The version of the secret. - * @param [options] The optional parameters - * @returns Promise - */ - updateSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, options?: Models.KeyVaultClientUpdateSecretOptionalParams): Promise; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param secretVersion The version of the secret. - * @param callback The callback - */ - updateSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param secretVersion The version of the secret. - * @param options The optional parameters - * @param callback The callback - */ - updateSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, options: Models.KeyVaultClientUpdateSecretOptionalParams, callback: coreHttp.ServiceCallback): void; - updateSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, options?: Models.KeyVaultClientUpdateSecretOptionalParams | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + updateSecret( + vaultBaseUrl: string, + secretName: string, + secretVersion: string, + options?: KeyVaultClientUpdateSecretOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + secretVersion, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - secretVersion, - options - }, - updateSecretOperationSpec, - callback) as Promise; + operationArguments, + updateSecretOperationSpec + ) as Promise; } /** - * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires - * the secrets/get permission. - * @summary Get a specified secret from a given key vault. - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param secretVersion The version of the secret. This URI fragment is optional. If not specified, - * the latest version of the secret is returned. - * @param [options] The optional parameters - * @returns Promise - */ - getSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, options?: coreHttp.RequestOptionsBase): Promise; - /** + * The GET operation is applicable to any secret stored in Azure Key Vault. This operation requires the + * secrets/get permission. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param secretVersion The version of the secret. This URI fragment is optional. If not specified, - * the latest version of the secret is returned. - * @param callback The callback - */ - getSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param secretVersion The version of the secret. This URI fragment is optional. If not specified, - * the latest version of the secret is returned. - * @param options The optional parameters - * @param callback The callback - */ - getSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, options: coreHttp.RequestOptionsBase, callback: coreHttp.ServiceCallback): void; - getSecret(vaultBaseUrl: string, secretName: string, secretVersion: string, options?: coreHttp.RequestOptionsBase | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param secretVersion The version of the secret. This URI fragment is optional. If not specified, the + * latest version of the secret is returned. + * @param options The options parameters. + */ + getSecret( + vaultBaseUrl: string, + secretName: string, + secretVersion: string, + options?: coreHttp.OperationOptions + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + secretVersion, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - secretVersion, - options - }, - getSecretOperationSpec, - callback) as Promise; + operationArguments, + getSecretOperationSpec + ) as Promise; } /** * The Get Secrets operation is applicable to the entire vault. However, only the base secret * identifier and its attributes are provided in the response. Individual secret versions are not * listed in the response. This operation requires the secrets/list permission. - * @summary List secrets in a specified key vault. - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param [options] The optional parameters - * @returns Promise - */ - getSecrets(vaultBaseUrl: string, options?: Models.KeyVaultClientGetSecretsOptionalParams): Promise; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param callback The callback - */ - getSecrets(vaultBaseUrl: string, callback: coreHttp.ServiceCallback): void; - /** * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param options The optional parameters - * @param callback The callback + * @param options The options parameters. */ - getSecrets(vaultBaseUrl: string, options: Models.KeyVaultClientGetSecretsOptionalParams, callback: coreHttp.ServiceCallback): void; - getSecrets(vaultBaseUrl: string, options?: Models.KeyVaultClientGetSecretsOptionalParams | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + getSecrets( + vaultBaseUrl: string, + options?: KeyVaultClientGetSecretsOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - options - }, - getSecretsOperationSpec, - callback) as Promise; + operationArguments, + getSecretsOperationSpec + ) as Promise; } /** - * The full secret identifier and attributes are provided in the response. No values are returned - * for the secrets. This operations requires the secrets/list permission. - * @summary List all versions of the specified secret. - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param [options] The optional parameters - * @returns Promise - */ - getSecretVersions(vaultBaseUrl: string, secretName: string, options?: Models.KeyVaultClientGetSecretVersionsOptionalParams): Promise; - /** + * The full secret identifier and attributes are provided in the response. No values are returned for + * the secrets. This operations requires the secrets/list permission. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param callback The callback - */ - getSecretVersions(vaultBaseUrl: string, secretName: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param options The optional parameters - * @param callback The callback - */ - getSecretVersions(vaultBaseUrl: string, secretName: string, options: Models.KeyVaultClientGetSecretVersionsOptionalParams, callback: coreHttp.ServiceCallback): void; - getSecretVersions(vaultBaseUrl: string, secretName: string, options?: Models.KeyVaultClientGetSecretVersionsOptionalParams | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + getSecretVersions( + vaultBaseUrl: string, + secretName: string, + options?: KeyVaultClientGetSecretVersionsOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - options - }, - getSecretVersionsOperationSpec, - callback) as Promise; + operationArguments, + getSecretVersionsOperationSpec + ) as Promise; } /** - * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled - * for soft-delete. This operation requires the secrets/list permission. - * @summary Lists deleted secrets for the specified vault. + * The Get Deleted Secrets operation returns the secrets that have been deleted for a vault enabled for + * soft-delete. This operation requires the secrets/list permission. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param [options] The optional parameters - * @returns Promise + * @param options The options parameters. */ - getDeletedSecrets(vaultBaseUrl: string, options?: Models.KeyVaultClientGetDeletedSecretsOptionalParams): Promise; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param callback The callback - */ - getDeletedSecrets(vaultBaseUrl: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param options The optional parameters - * @param callback The callback - */ - getDeletedSecrets(vaultBaseUrl: string, options: Models.KeyVaultClientGetDeletedSecretsOptionalParams, callback: coreHttp.ServiceCallback): void; - getDeletedSecrets(vaultBaseUrl: string, options?: Models.KeyVaultClientGetDeletedSecretsOptionalParams | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + getDeletedSecrets( + vaultBaseUrl: string, + options?: KeyVaultClientGetDeletedSecretsOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - options - }, - getDeletedSecretsOperationSpec, - callback) as Promise; + operationArguments, + getDeletedSecretsOperationSpec + ) as Promise; } /** * The Get Deleted Secret operation returns the specified deleted secret along with its attributes. * This operation requires the secrets/get permission. - * @summary Gets the specified deleted secret. - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param [options] The optional parameters - * @returns Promise - */ - getDeletedSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase): Promise; - /** * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param callback The callback - */ - getDeletedSecret(vaultBaseUrl: string, secretName: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param options The optional parameters - * @param callback The callback - */ - getDeletedSecret(vaultBaseUrl: string, secretName: string, options: coreHttp.RequestOptionsBase, callback: coreHttp.ServiceCallback): void; - getDeletedSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + getDeletedSecret( + vaultBaseUrl: string, + secretName: string, + options?: coreHttp.OperationOptions + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - options - }, - getDeletedSecretOperationSpec, - callback) as Promise; + operationArguments, + getDeletedSecretOperationSpec + ) as Promise; } /** * The purge deleted secret operation removes the secret permanently, without the possibility of - * recovery. This operation can only be enabled on a soft-delete enabled vault. This operation - * requires the secrets/purge permission. - * @summary Permanently deletes the specified secret. - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param [options] The optional parameters - * @returns Promise - */ - purgeDeletedSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase): Promise; - /** + * recovery. This operation can only be enabled on a soft-delete enabled vault. This operation requires + * the secrets/purge permission. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param callback The callback - */ - purgeDeletedSecret(vaultBaseUrl: string, secretName: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param options The optional parameters - * @param callback The callback - */ - purgeDeletedSecret(vaultBaseUrl: string, secretName: string, options: coreHttp.RequestOptionsBase, callback: coreHttp.ServiceCallback): void; - purgeDeletedSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + purgeDeletedSecret( + vaultBaseUrl: string, + secretName: string, + options?: coreHttp.OperationOptions + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - options - }, - purgeDeletedSecretOperationSpec, - callback); + operationArguments, + purgeDeletedSecretOperationSpec + ) as Promise; } /** * Recovers the deleted secret in the specified vault. This operation can only be performed on a * soft-delete enabled vault. This operation requires the secrets/recover permission. - * @summary Recovers the deleted secret to the latest version. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the deleted secret. - * @param [options] The optional parameters - * @returns Promise - */ - recoverDeletedSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase): Promise; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret. - * @param callback The callback - */ - recoverDeletedSecret(vaultBaseUrl: string, secretName: string, callback: coreHttp.ServiceCallback): void; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the deleted secret. - * @param options The optional parameters - * @param callback The callback - */ - recoverDeletedSecret(vaultBaseUrl: string, secretName: string, options: coreHttp.RequestOptionsBase, callback: coreHttp.ServiceCallback): void; - recoverDeletedSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + recoverDeletedSecret( + vaultBaseUrl: string, + secretName: string, + options?: coreHttp.OperationOptions + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - options - }, - recoverDeletedSecretOperationSpec, - callback) as Promise; + operationArguments, + recoverDeletedSecretOperationSpec + ) as Promise; } /** * Requests that a backup of the specified secret be downloaded to the client. All versions of the * secret will be downloaded. This operation requires the secrets/backup permission. - * @summary Backs up the specified secret. - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param [options] The optional parameters - * @returns Promise - */ - backupSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase): Promise; - /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretName The name of the secret. - * @param callback The callback - */ - backupSecret(vaultBaseUrl: string, secretName: string, callback: coreHttp.ServiceCallback): void; - /** * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretName The name of the secret. - * @param options The optional parameters - * @param callback The callback - */ - backupSecret(vaultBaseUrl: string, secretName: string, options: coreHttp.RequestOptionsBase, callback: coreHttp.ServiceCallback): void; - backupSecret(vaultBaseUrl: string, secretName: string, options?: coreHttp.RequestOptionsBase | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param options The options parameters. + */ + backupSecret( + vaultBaseUrl: string, + secretName: string, + options?: coreHttp.OperationOptions + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretName, - options - }, - backupSecretOperationSpec, - callback) as Promise; + operationArguments, + backupSecretOperationSpec + ) as Promise; } /** * Restores a backed up secret, and all its versions, to a vault. This operation requires the * secrets/restore permission. - * @summary Restores a backed up secret to a vault. * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. * @param secretBundleBackup The backup blob associated with a secret bundle. - * @param [options] The optional parameters - * @returns Promise - */ - restoreSecret(vaultBaseUrl: string, secretBundleBackup: Uint8Array, options?: coreHttp.RequestOptionsBase): Promise; + * @param options The options parameters. + */ + restoreSecret( + vaultBaseUrl: string, + secretBundleBackup: Uint8Array, + options?: coreHttp.OperationOptions + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretBundleBackup, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; + return this.sendOperationRequest( + operationArguments, + restoreSecretOperationSpec + ) as Promise; + } + /** - * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretBundleBackup The backup blob associated with a secret bundle. - * @param callback The callback - */ - restoreSecret(vaultBaseUrl: string, secretBundleBackup: Uint8Array, callback: coreHttp.ServiceCallback): void; + * GetSecretsNext + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param nextLink The nextLink from the previous successful call to the GetSecrets method. + * @param options The options parameters. + */ + getSecretsNext( + vaultBaseUrl: string, + nextLink: string, + options?: KeyVaultClientGetSecretsNextOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + nextLink, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; + return this.sendOperationRequest( + operationArguments, + getSecretsNextOperationSpec + ) as Promise; + } + /** + * GetSecretVersionsNext * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. - * @param secretBundleBackup The backup blob associated with a secret bundle. - * @param options The optional parameters - * @param callback The callback - */ - restoreSecret(vaultBaseUrl: string, secretBundleBackup: Uint8Array, options: coreHttp.RequestOptionsBase, callback: coreHttp.ServiceCallback): void; - restoreSecret(vaultBaseUrl: string, secretBundleBackup: Uint8Array, options?: coreHttp.RequestOptionsBase | coreHttp.ServiceCallback, callback?: coreHttp.ServiceCallback): Promise { + * @param secretName The name of the secret. + * @param nextLink The nextLink from the previous successful call to the GetSecretVersions method. + * @param options The options parameters. + */ + getSecretVersionsNext( + vaultBaseUrl: string, + secretName: string, + nextLink: string, + options?: KeyVaultClientGetSecretVersionsNextOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + secretName, + nextLink, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; return this.sendOperationRequest( - { - vaultBaseUrl, - secretBundleBackup, - options - }, - restoreSecretOperationSpec, - callback) as Promise; + operationArguments, + getSecretVersionsNextOperationSpec + ) as Promise; } -} + /** + * GetDeletedSecretsNext + * @param vaultBaseUrl The vault name, for example https://myvault.vault.azure.net. + * @param nextLink The nextLink from the previous successful call to the GetDeletedSecrets method. + * @param options The options parameters. + */ + getDeletedSecretsNext( + vaultBaseUrl: string, + nextLink: string, + options?: KeyVaultClientGetDeletedSecretsNextOptionalParams + ): Promise { + const operationArguments: coreHttp.OperationArguments = { + vaultBaseUrl, + nextLink, + options: coreHttp.operationOptionsToRequestOptionsBase(options || {}) + }; + return this.sendOperationRequest( + operationArguments, + getDeletedSecretsNextOperationSpec + ) as Promise; + } +} // Operation Specifications -const serializer = new coreHttp.Serializer(Mappers); +const serializer = new coreHttp.Serializer(Mappers, /* isXml */ false); + const setSecretOperationSpec: coreHttp.OperationSpec = { + path: "/secrets/{secret-name}", httpMethod: "PUT", - path: "secrets/{secret-name}", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName0 - ], - queryParameters: [ - Parameters.apiVersion - ], - requestBody: { - parameterPath: { - value: "value", - tags: [ - "options", - "tags" - ], - contentType: [ - "options", - "contentType" - ], - secretAttributes: [ - "options", - "secretAttributes" - ] - }, - mapper: { - ...Mappers.SecretSetParameters, - required: true - } - }, responses: { 200: { bodyMapper: Mappers.SecretBundle @@ -485,19 +417,24 @@ const setSecretOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + requestBody: { + parameterPath: { + value: ["value"], + tags: ["options", "tags"], + contentType: ["options", "contentType"], + secretAttributes: ["options", "secretAttributes"] + }, + mapper: Mappers.SecretSetParameters + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [Parameters.vaultBaseUrl, Parameters.secretName], + headerParameters: [Parameters.contentType, Parameters.accept], + mediaType: "json", serializer }; - const deleteSecretOperationSpec: coreHttp.OperationSpec = { + path: "/secrets/{secret-name}", httpMethod: "DELETE", - path: "secrets/{secret-name}", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName1 - ], - queryParameters: [ - Parameters.apiVersion - ], responses: { 200: { bodyMapper: Mappers.DeletedSecretBundle @@ -506,40 +443,14 @@ const deleteSecretOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion], + urlParameters: [Parameters.vaultBaseUrl, Parameters.secretName1], + headerParameters: [Parameters.accept], serializer }; - const updateSecretOperationSpec: coreHttp.OperationSpec = { + path: "/secrets/{secret-name}/{secret-version}", httpMethod: "PATCH", - path: "secrets/{secret-name}/{secret-version}", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName1, - Parameters.secretVersion - ], - queryParameters: [ - Parameters.apiVersion - ], - requestBody: { - parameterPath: { - contentType: [ - "options", - "contentType" - ], - secretAttributes: [ - "options", - "secretAttributes" - ], - tags: [ - "options", - "tags" - ] - }, - mapper: { - ...Mappers.SecretUpdateParameters, - required: true - } - }, responses: { 200: { bodyMapper: Mappers.SecretBundle @@ -548,20 +459,27 @@ const updateSecretOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, - serializer -}; - -const getSecretOperationSpec: coreHttp.OperationSpec = { - httpMethod: "GET", - path: "secrets/{secret-name}/{secret-version}", + requestBody: { + parameterPath: { + contentType: ["options", "contentType"], + secretAttributes: ["options", "secretAttributes"], + tags: ["options", "tags"] + }, + mapper: Mappers.SecretUpdateParameters + }, + queryParameters: [Parameters.apiVersion], urlParameters: [ Parameters.vaultBaseUrl, Parameters.secretName1, Parameters.secretVersion ], - queryParameters: [ - Parameters.apiVersion - ], + headerParameters: [Parameters.contentType, Parameters.accept], + mediaType: "json", + serializer +}; +const getSecretOperationSpec: coreHttp.OperationSpec = { + path: "/secrets/{secret-name}/{secret-version}", + httpMethod: "GET", responses: { 200: { bodyMapper: Mappers.SecretBundle @@ -570,19 +488,18 @@ const getSecretOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion], + urlParameters: [ + Parameters.vaultBaseUrl, + Parameters.secretName1, + Parameters.secretVersion + ], + headerParameters: [Parameters.accept], serializer }; - const getSecretsOperationSpec: coreHttp.OperationSpec = { + path: "/secrets", httpMethod: "GET", - path: "secrets", - urlParameters: [ - Parameters.vaultBaseUrl - ], - queryParameters: [ - Parameters.maxresults, - Parameters.apiVersion - ], responses: { 200: { bodyMapper: Mappers.SecretListResult @@ -591,20 +508,14 @@ const getSecretsOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion, Parameters.maxresults], + urlParameters: [Parameters.vaultBaseUrl], + headerParameters: [Parameters.accept], serializer }; - const getSecretVersionsOperationSpec: coreHttp.OperationSpec = { + path: "/secrets/{secret-name}/versions", httpMethod: "GET", - path: "secrets/{secret-name}/versions", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName1 - ], - queryParameters: [ - Parameters.maxresults, - Parameters.apiVersion - ], responses: { 200: { bodyMapper: Mappers.SecretListResult @@ -613,19 +524,14 @@ const getSecretVersionsOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion, Parameters.maxresults], + urlParameters: [Parameters.vaultBaseUrl, Parameters.secretName1], + headerParameters: [Parameters.accept], serializer }; - const getDeletedSecretsOperationSpec: coreHttp.OperationSpec = { + path: "/deletedsecrets", httpMethod: "GET", - path: "deletedsecrets", - urlParameters: [ - Parameters.vaultBaseUrl - ], - queryParameters: [ - Parameters.maxresults, - Parameters.apiVersion - ], responses: { 200: { bodyMapper: Mappers.DeletedSecretListResult @@ -634,19 +540,14 @@ const getDeletedSecretsOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion, Parameters.maxresults], + urlParameters: [Parameters.vaultBaseUrl], + headerParameters: [Parameters.accept], serializer }; - const getDeletedSecretOperationSpec: coreHttp.OperationSpec = { + path: "/deletedsecrets/{secret-name}", httpMethod: "GET", - path: "deletedsecrets/{secret-name}", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName1 - ], - queryParameters: [ - Parameters.apiVersion - ], responses: { 200: { bodyMapper: Mappers.DeletedSecretBundle @@ -655,38 +556,28 @@ const getDeletedSecretOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion], + urlParameters: [Parameters.vaultBaseUrl, Parameters.secretName1], + headerParameters: [Parameters.accept], serializer }; - const purgeDeletedSecretOperationSpec: coreHttp.OperationSpec = { + path: "/deletedsecrets/{secret-name}", httpMethod: "DELETE", - path: "deletedsecrets/{secret-name}", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName1 - ], - queryParameters: [ - Parameters.apiVersion - ], responses: { 204: {}, default: { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion], + urlParameters: [Parameters.vaultBaseUrl, Parameters.secretName1], + headerParameters: [Parameters.accept], serializer }; - const recoverDeletedSecretOperationSpec: coreHttp.OperationSpec = { + path: "/deletedsecrets/{secret-name}/recover", httpMethod: "POST", - path: "deletedsecrets/{secret-name}/recover", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName1 - ], - queryParameters: [ - Parameters.apiVersion - ], responses: { 200: { bodyMapper: Mappers.SecretBundle @@ -695,19 +586,14 @@ const recoverDeletedSecretOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion], + urlParameters: [Parameters.vaultBaseUrl, Parameters.secretName1], + headerParameters: [Parameters.accept], serializer }; - const backupSecretOperationSpec: coreHttp.OperationSpec = { + path: "/secrets/{secret-name}/backup", httpMethod: "POST", - path: "secrets/{secret-name}/backup", - urlParameters: [ - Parameters.vaultBaseUrl, - Parameters.secretName1 - ], - queryParameters: [ - Parameters.apiVersion - ], responses: { 200: { bodyMapper: Mappers.BackupSecretResult @@ -716,41 +602,81 @@ const backupSecretOperationSpec: coreHttp.OperationSpec = { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion], + urlParameters: [Parameters.vaultBaseUrl, Parameters.secretName1], + headerParameters: [Parameters.accept], serializer }; - const restoreSecretOperationSpec: coreHttp.OperationSpec = { + path: "/secrets/restore", httpMethod: "POST", - path: "secrets/restore", - urlParameters: [ - Parameters.vaultBaseUrl - ], - queryParameters: [ - Parameters.apiVersion - ], + responses: { + 200: { + bodyMapper: Mappers.SecretBundle + }, + default: { + bodyMapper: Mappers.KeyVaultError + } + }, requestBody: { - parameterPath: { - secretBundleBackup: "secretBundleBackup" + parameterPath: { secretBundleBackup: ["secretBundleBackup"] }, + mapper: Mappers.SecretRestoreParameters + }, + queryParameters: [Parameters.apiVersion], + urlParameters: [Parameters.vaultBaseUrl], + headerParameters: [Parameters.contentType, Parameters.accept], + mediaType: "json", + serializer +}; +const getSecretsNextOperationSpec: coreHttp.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.SecretListResult }, - mapper: { - ...Mappers.SecretRestoreParameters, - required: true + default: { + bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion, Parameters.maxresults], + urlParameters: [Parameters.vaultBaseUrl, Parameters.nextLink], + headerParameters: [Parameters.accept], + serializer +}; +const getSecretVersionsNextOperationSpec: coreHttp.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", responses: { 200: { - bodyMapper: Mappers.SecretBundle + bodyMapper: Mappers.SecretListResult }, default: { bodyMapper: Mappers.KeyVaultError } }, + queryParameters: [Parameters.apiVersion, Parameters.maxresults], + urlParameters: [ + Parameters.vaultBaseUrl, + Parameters.secretName1, + Parameters.nextLink + ], + headerParameters: [Parameters.accept], serializer }; - -export { - KeyVaultClient, - KeyVaultClientContext, - Models as KeyVaultModels, - Mappers as KeyVaultMappers +const getDeletedSecretsNextOperationSpec: coreHttp.OperationSpec = { + path: "{nextLink}", + httpMethod: "GET", + responses: { + 200: { + bodyMapper: Mappers.DeletedSecretListResult + }, + default: { + bodyMapper: Mappers.KeyVaultError + } + }, + queryParameters: [Parameters.apiVersion, Parameters.maxresults], + urlParameters: [Parameters.vaultBaseUrl, Parameters.nextLink], + headerParameters: [Parameters.accept], + serializer }; diff --git a/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClientContext.ts b/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClientContext.ts index 7f36a42013e3..ca80d402bbfa 100644 --- a/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClientContext.ts +++ b/sdk/keyvault/keyvault-secrets/src/generated/keyVaultClientContext.ts @@ -1,31 +1,35 @@ /* - * Copyright (c) Microsoft Corporation. All rights reserved. - * Licensed under the MIT License. See License.txt in the project root for - * license information. + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. * * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ import * as coreHttp from "@azure/core-http"; +import { ApiVersion72Preview, KeyVaultClientOptionalParams } from "./models"; const packageName = "@azure/keyvault-secrets"; export const packageVersion = "4.2.0-beta.2"; +/** @hidden */ export class KeyVaultClientContext extends coreHttp.ServiceClient { - apiVersion: string; + apiVersion: ApiVersion72Preview; /** * Initializes a new instance of the KeyVaultClientContext class. - * @param apiVersion Client API version. - * @param [options] The parameter options + * @param apiVersion Api Version + * @param options The parameter options */ - constructor(apiVersion: string, options?: coreHttp.ServiceClientOptions) { - if (apiVersion == undefined) { - throw new Error("'apiVersion' cannot be null."); + constructor( + apiVersion: ApiVersion72Preview, + options?: KeyVaultClientOptionalParams + ) { + if (apiVersion === undefined) { + throw new Error("'apiVersion' cannot be null"); } + // Initializing default values for options if (!options) { options = {}; } @@ -37,8 +41,11 @@ export class KeyVaultClientContext extends coreHttp.ServiceClient { super(undefined, options); - this.baseUri = "{vaultBaseUrl}"; this.requestContentType = "application/json; charset=utf-8"; + + this.baseUri = options.endpoint || "{vaultBaseUrl}"; + + // Parameter assignments this.apiVersion = apiVersion; } } diff --git a/sdk/keyvault/keyvault-secrets/src/generated/models/index.ts b/sdk/keyvault/keyvault-secrets/src/generated/models/index.ts index c3a68b89563a..288f9aa74f7d 100644 --- a/sdk/keyvault/keyvault-secrets/src/generated/models/index.ts +++ b/sdk/keyvault/keyvault-secrets/src/generated/models/index.ts @@ -1,601 +1,502 @@ /* - * Copyright (c) Microsoft Corporation. All rights reserved. - * Licensed under the MIT License. See License.txt in the project root for license information. + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. * * Code generated by Microsoft (R) AutoRest Code Generator. * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ - import * as coreHttp from "@azure/core-http"; -/** - * The object attributes managed by the KeyVault service. - */ +/** The secret set parameters. */ +export interface SecretSetParameters { + /** The value of the secret. */ + value: string; + /** Application specific metadata in the form of key-value pairs. */ + tags?: { [propertyName: string]: string }; + /** Type of the secret value such as a password. */ + contentType?: string; + /** The secret management attributes. */ + secretAttributes?: SecretAttributes; +} + +/** The object attributes managed by the KeyVault service. */ export interface Attributes { - /** - * Determines whether the object is enabled. - */ + /** Determines whether the object is enabled. */ enabled?: boolean; - /** - * Not before date in UTC. - */ + /** Not before date in UTC. */ notBefore?: Date; - /** - * Expiry date in UTC. - */ + /** Expiry date in UTC. */ expires?: Date; /** * Creation time in UTC. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly created?: Date; /** * Last updated time in UTC. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly updated?: Date; } -/** - * The secret management attributes. - */ -export interface SecretAttributes extends Attributes { - /** - * softDelete data retention days. Value should be >=7 and <=90 when softDelete enabled, - * otherwise 0. - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly recoverableDays?: number; - /** - * Reflects the deletion recovery level currently in effect for secrets in the current vault. If - * it contains 'Purgeable', the secret can be permanently deleted by a privileged user; - * otherwise, only the system can purge the secret, at the end of the retention interval. - * Possible values include: 'Purgeable', 'Recoverable+Purgeable', 'Recoverable', - * 'Recoverable+ProtectedSubscription', 'CustomizedRecoverable+Purgeable', - * 'CustomizedRecoverable', 'CustomizedRecoverable+ProtectedSubscription' - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly recoveryLevel?: DeletionRecoveryLevel; -} - -/** - * A secret consisting of a value, id and its attributes. - */ +/** A secret consisting of a value, id and its attributes. */ export interface SecretBundle { - /** - * The secret value. - */ + /** The secret value. */ value?: string; - /** - * The secret id. - */ + /** The secret id. */ id?: string; - /** - * The content type of the secret. - */ + /** The content type of the secret. */ contentType?: string; - /** - * The secret management attributes. - */ + /** The secret management attributes. */ attributes?: SecretAttributes; - /** - * Application specific metadata in the form of key-value pairs. - */ + /** Application specific metadata in the form of key-value pairs. */ tags?: { [propertyName: string]: string }; /** - * If this is a secret backing a KV certificate, then this field specifies the corresponding key - * backing the KV certificate. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * If this is a secret backing a KV certificate, then this field specifies the corresponding key backing the KV certificate. + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly kid?: string; /** - * True if the secret's lifetime is managed by key vault. If this is a secret backing a - * certificate, then managed will be true. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * True if the secret's lifetime is managed by key vault. If this is a secret backing a certificate, then managed will be true. + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly managed?: boolean; } -/** - * The secret item containing secret metadata. - */ -export interface SecretItem { - /** - * Secret identifier. - */ - id?: string; - /** - * The secret management attributes. - */ - attributes?: SecretAttributes; - /** - * Application specific metadata in the form of key-value pairs. - */ - tags?: { [propertyName: string]: string }; - /** - * Type of the secret value such as a password. - */ - contentType?: string; - /** - * True if the secret's lifetime is managed by key vault. If this is a key backing a certificate, - * then managed will be true. - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly managed?: boolean; -} - -/** - * A Deleted Secret consisting of its previous id, attributes and its tags, as well as information - * on when it will be purged. - */ -export interface DeletedSecretBundle extends SecretBundle { - /** - * The url of the recovery object, used to identify and recover the deleted secret. - */ - recoveryId?: string; - /** - * The time when the secret is scheduled to be purged, in UTC - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly scheduledPurgeDate?: Date; - /** - * The time when the secret was deleted, in UTC - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly deletedDate?: Date; -} - -/** - * The deleted secret item containing metadata about the deleted secret. - */ -export interface DeletedSecretItem extends SecretItem { - /** - * The url of the recovery object, used to identify and recover the deleted secret. - */ - recoveryId?: string; - /** - * The time when the secret is scheduled to be purged, in UTC - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly scheduledPurgeDate?: Date; - /** - * The time when the secret was deleted, in UTC - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly deletedDate?: Date; -} - -/** - * The secret restore parameters. - */ -export interface SecretRestoreParameters { - /** - * The backup blob associated with a secret bundle. - */ - secretBundleBackup: Uint8Array; -} - -/** - * Properties of the key backing a certificate. - */ -export interface SecretProperties { +/** The key vault error exception. */ +export interface KeyVaultError { /** - * The media type (MIME type). + * The key vault server error. + * NOTE: This property will not be serialized. It can only be populated by the server. */ - contentType?: string; + readonly error?: ErrorModel; } -/** - * The secret set parameters. - */ -export interface SecretSetParameters { - /** - * The value of the secret. - */ - value: string; +/** The key vault server error. */ +export interface ErrorModel { /** - * Application specific metadata in the form of key-value pairs. + * The error code. + * NOTE: This property will not be serialized. It can only be populated by the server. */ - tags?: { [propertyName: string]: string }; + readonly code?: string; /** - * Type of the secret value such as a password. + * The error message. + * NOTE: This property will not be serialized. It can only be populated by the server. */ - contentType?: string; + readonly message?: string; /** - * The secret management attributes. + * The key vault server error. + * NOTE: This property will not be serialized. It can only be populated by the server. */ - secretAttributes?: SecretAttributes; + readonly innerError?: ErrorModel; } -/** - * The secret update parameters. - */ +/** The secret update parameters. */ export interface SecretUpdateParameters { - /** - * Type of the secret value such as a password. - */ + /** Type of the secret value such as a password. */ contentType?: string; - /** - * The secret management attributes. - */ + /** The secret management attributes. */ secretAttributes?: SecretAttributes; - /** - * Application specific metadata in the form of key-value pairs. - */ + /** Application specific metadata in the form of key-value pairs. */ tags?: { [propertyName: string]: string }; } -/** - * The secret list result. - */ +/** The secret list result. */ export interface SecretListResult { /** - * A response message containing a list of secrets in the key vault along with a link to the next - * page of secrets. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * A response message containing a list of secrets in the key vault along with a link to the next page of secrets. + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly value?: SecretItem[]; /** * The URL to get the next set of secrets. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly nextLink?: string; } -/** - * The deleted secret list result - */ +/** The secret item containing secret metadata. */ +export interface SecretItem { + /** Secret identifier. */ + id?: string; + /** The secret management attributes. */ + attributes?: SecretAttributes; + /** Application specific metadata in the form of key-value pairs. */ + tags?: { [propertyName: string]: string }; + /** Type of the secret value such as a password. */ + contentType?: string; + /** + * True if the secret's lifetime is managed by key vault. If this is a key backing a certificate, then managed will be true. + * NOTE: This property will not be serialized. It can only be populated by the server. + */ + readonly managed?: boolean; +} + +/** The deleted secret list result */ export interface DeletedSecretListResult { /** - * A response message containing a list of the deleted secrets in the vault along with a link to - * the next page of deleted secrets - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * A response message containing a list of the deleted secrets in the vault along with a link to the next page of deleted secrets + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly value?: DeletedSecretItem[]; /** * The URL to get the next set of deleted secrets. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly nextLink?: string; } -/** - * The backup secret result, containing the backup blob. - */ +/** The backup secret result, containing the backup blob. */ export interface BackupSecretResult { /** * The backup blob containing the backed up secret. - * **NOTE: This property will not be serialized. It can only be populated by the server.** + * NOTE: This property will not be serialized. It can only be populated by the server. */ readonly value?: Uint8Array; } -/** - * The key vault server error. - */ -export interface ErrorModel { - /** - * The error code. - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly code?: string; - /** - * The error message. - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly message?: string; - /** - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly innerError?: ErrorModel; +/** The secret restore parameters. */ +export interface SecretRestoreParameters { + /** The backup blob associated with a secret bundle. */ + secretBundleBackup: Uint8Array; } -/** - * The key vault error exception. - */ -export interface KeyVaultError { - /** - * **NOTE: This property will not be serialized. It can only be populated by the server.** - */ - readonly error?: ErrorModel; +/** Properties of the key backing a certificate. */ +export interface SecretProperties { + /** The media type (MIME type). */ + contentType?: string; } -/** - * Optional Parameters. - */ -export interface KeyVaultClientSetSecretOptionalParams extends coreHttp.RequestOptionsBase { +/** The secret management attributes. */ +export type SecretAttributes = Attributes & { /** - * Application specific metadata in the form of key-value pairs. + * softDelete data retention days. Value should be >=7 and <=90 when softDelete enabled, otherwise 0. + * NOTE: This property will not be serialized. It can only be populated by the server. */ - tags?: { [propertyName: string]: string }; + readonly recoverableDays?: number; /** - * Type of the secret value such as a password. + * Reflects the deletion recovery level currently in effect for secrets in the current vault. If it contains 'Purgeable', the secret can be permanently deleted by a privileged user; otherwise, only the system can purge the secret, at the end of the retention interval. + * NOTE: This property will not be serialized. It can only be populated by the server. */ - contentType?: string; + readonly recoveryLevel?: DeletionRecoveryLevel; +}; + +/** A Deleted Secret consisting of its previous id, attributes and its tags, as well as information on when it will be purged. */ +export type DeletedSecretBundle = SecretBundle & { + /** The url of the recovery object, used to identify and recover the deleted secret. */ + recoveryId?: string; /** - * The secret management attributes. + * The time when the secret is scheduled to be purged, in UTC + * NOTE: This property will not be serialized. It can only be populated by the server. */ - secretAttributes?: SecretAttributes; -} - -/** - * Optional Parameters. - */ -export interface KeyVaultClientUpdateSecretOptionalParams extends coreHttp.RequestOptionsBase { + readonly scheduledPurgeDate?: Date; /** - * Type of the secret value such as a password. + * The time when the secret was deleted, in UTC + * NOTE: This property will not be serialized. It can only be populated by the server. */ - contentType?: string; + readonly deletedDate?: Date; +}; + +/** The deleted secret item containing metadata about the deleted secret. */ +export type DeletedSecretItem = SecretItem & { + /** The url of the recovery object, used to identify and recover the deleted secret. */ + recoveryId?: string; /** - * The secret management attributes. + * The time when the secret is scheduled to be purged, in UTC + * NOTE: This property will not be serialized. It can only be populated by the server. */ - secretAttributes?: SecretAttributes; + readonly scheduledPurgeDate?: Date; /** - * Application specific metadata in the form of key-value pairs. + * The time when the secret was deleted, in UTC + * NOTE: This property will not be serialized. It can only be populated by the server. */ - tags?: { [propertyName: string]: string }; + readonly deletedDate?: Date; +}; + +/** Known values of {@link ApiVersion72Preview} that the service accepts. */ +export const enum KnownApiVersion72Preview { + /** Api Version '7.2-preview' */ + Seven2Preview = "7.2-preview" } /** - * Optional Parameters. - */ -export interface KeyVaultClientGetSecretsOptionalParams extends coreHttp.RequestOptionsBase { - /** - * Maximum number of results to return in a page. If not specified, the service will return up to - * 25 results. - */ - maxresults?: number; + * Defines values for ApiVersion72Preview. \ + * {@link KnownApiVersion72Preview} can be used interchangeably with ApiVersion72Preview, + * this enum contains the known values that the service supports. + * ### Know values supported by the service + * **7.2-preview**: Api Version '7.2-preview' + */ +export type ApiVersion72Preview = string; + +/** Known values of {@link DeletionRecoveryLevel} that the service accepts. */ +export const enum KnownDeletionRecoveryLevel { + /** Denotes a vault state in which deletion is an irreversible operation, without the possibility for recovery. This level corresponds to no protection being available against a Delete operation; the data is irretrievably lost upon accepting a Delete operation at the entity level or higher (vault, resource group, subscription etc.) */ + Purgeable = "Purgeable", + /** Denotes a vault state in which deletion is recoverable, and which also permits immediate and permanent deletion (i.e. purge). This level guarantees the recoverability of the deleted entity during the retention interval (90 days), unless a Purge operation is requested, or the subscription is cancelled. System wil permanently delete it after 90 days, if not recovered */ + RecoverablePurgeable = "Recoverable+Purgeable", + /** Denotes a vault state in which deletion is recoverable without the possibility for immediate and permanent deletion (i.e. purge). This level guarantees the recoverability of the deleted entity during the retention interval(90 days) and while the subscription is still available. System wil permanently delete it after 90 days, if not recovered */ + Recoverable = "Recoverable", + /** Denotes a vault and subscription state in which deletion is recoverable within retention interval (90 days), immediate and permanent deletion (i.e. purge) is not permitted, and in which the subscription itself cannot be permanently canceled. System wil permanently delete it after 90 days, if not recovered */ + RecoverableProtectedSubscription = "Recoverable+ProtectedSubscription", + /** Denotes a vault state in which deletion is recoverable, and which also permits immediate and permanent deletion (i.e. purge when 7<= SoftDeleteRetentionInDays < 90). This level guarantees the recoverability of the deleted entity during the retention interval, unless a Purge operation is requested, or the subscription is cancelled. */ + CustomizedRecoverablePurgeable = "CustomizedRecoverable+Purgeable", + /** Denotes a vault state in which deletion is recoverable without the possibility for immediate and permanent deletion (i.e. purge when 7<= SoftDeleteRetentionInDays < 90).This level guarantees the recoverability of the deleted entity during the retention interval and while the subscription is still available. */ + CustomizedRecoverable = "CustomizedRecoverable", + /** Denotes a vault and subscription state in which deletion is recoverable, immediate and permanent deletion (i.e. purge) is not permitted, and in which the subscription itself cannot be permanently canceled when 7<= SoftDeleteRetentionInDays < 90. This level guarantees the recoverability of the deleted entity during the retention interval, and also reflects the fact that the subscription itself cannot be cancelled. */ + CustomizedRecoverableProtectedSubscription = "CustomizedRecoverable+ProtectedSubscription" } /** - * Optional Parameters. - */ -export interface KeyVaultClientGetSecretVersionsOptionalParams extends coreHttp.RequestOptionsBase { - /** - * Maximum number of results to return in a page. If not specified, the service will return up to - * 25 results. - */ - maxresults?: number; + * Defines values for DeletionRecoveryLevel. \ + * {@link KnownDeletionRecoveryLevel} can be used interchangeably with DeletionRecoveryLevel, + * this enum contains the known values that the service supports. + * ### Know values supported by the service + * **Purgeable**: Denotes a vault state in which deletion is an irreversible operation, without the possibility for recovery. This level corresponds to no protection being available against a Delete operation; the data is irretrievably lost upon accepting a Delete operation at the entity level or higher (vault, resource group, subscription etc.) \ + * **Recoverable+Purgeable**: Denotes a vault state in which deletion is recoverable, and which also permits immediate and permanent deletion (i.e. purge). This level guarantees the recoverability of the deleted entity during the retention interval (90 days), unless a Purge operation is requested, or the subscription is cancelled. System wil permanently delete it after 90 days, if not recovered \ + * **Recoverable**: Denotes a vault state in which deletion is recoverable without the possibility for immediate and permanent deletion (i.e. purge). This level guarantees the recoverability of the deleted entity during the retention interval(90 days) and while the subscription is still available. System wil permanently delete it after 90 days, if not recovered \ + * **Recoverable+ProtectedSubscription**: Denotes a vault and subscription state in which deletion is recoverable within retention interval (90 days), immediate and permanent deletion (i.e. purge) is not permitted, and in which the subscription itself cannot be permanently canceled. System wil permanently delete it after 90 days, if not recovered \ + * **CustomizedRecoverable+Purgeable**: Denotes a vault state in which deletion is recoverable, and which also permits immediate and permanent deletion (i.e. purge when 7<= SoftDeleteRetentionInDays < 90). This level guarantees the recoverability of the deleted entity during the retention interval, unless a Purge operation is requested, or the subscription is cancelled. \ + * **CustomizedRecoverable**: Denotes a vault state in which deletion is recoverable without the possibility for immediate and permanent deletion (i.e. purge when 7<= SoftDeleteRetentionInDays < 90).This level guarantees the recoverability of the deleted entity during the retention interval and while the subscription is still available. \ + * **CustomizedRecoverable+ProtectedSubscription**: Denotes a vault and subscription state in which deletion is recoverable, immediate and permanent deletion (i.e. purge) is not permitted, and in which the subscription itself cannot be permanently canceled when 7<= SoftDeleteRetentionInDays < 90. This level guarantees the recoverability of the deleted entity during the retention interval, and also reflects the fact that the subscription itself cannot be cancelled. + */ +export type DeletionRecoveryLevel = string; + +/** Optional parameters. */ +export interface KeyVaultClientSetSecretOptionalParams + extends coreHttp.OperationOptions { + /** Application specific metadata in the form of key-value pairs. */ + tags?: { [propertyName: string]: string }; + /** Type of the secret value such as a password. */ + contentType?: string; + /** The secret management attributes. */ + secretAttributes?: SecretAttributes; } -/** - * Optional Parameters. - */ -export interface KeyVaultClientGetDeletedSecretsOptionalParams extends coreHttp.RequestOptionsBase { - /** - * Maximum number of results to return in a page. If not specified the service will return up to - * 25 results. - */ - maxresults?: number; +/** Contains response data for the setSecret operation. */ +export type KeyVaultClientSetSecretResponse = SecretBundle & { + /** The underlying HTTP response. */ + _response: coreHttp.HttpResponse & { + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretBundle; + }; +}; + +/** Contains response data for the deleteSecret operation. */ +export type KeyVaultClientDeleteSecretResponse = DeletedSecretBundle & { + /** The underlying HTTP response. */ + _response: coreHttp.HttpResponse & { + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: DeletedSecretBundle; + }; +}; + +/** Optional parameters. */ +export interface KeyVaultClientUpdateSecretOptionalParams + extends coreHttp.OperationOptions { + /** Type of the secret value such as a password. */ + contentType?: string; + /** The secret management attributes. */ + secretAttributes?: SecretAttributes; + /** Application specific metadata in the form of key-value pairs. */ + tags?: { [propertyName: string]: string }; } -/** - * Defines values for DeletionRecoveryLevel. - * Possible values include: 'Purgeable', 'Recoverable+Purgeable', 'Recoverable', - * 'Recoverable+ProtectedSubscription', 'CustomizedRecoverable+Purgeable', 'CustomizedRecoverable', - * 'CustomizedRecoverable+ProtectedSubscription' - * @readonly - * @enum {string} - */ -export type DeletionRecoveryLevel = 'Purgeable' | 'Recoverable+Purgeable' | 'Recoverable' | 'Recoverable+ProtectedSubscription' | 'CustomizedRecoverable+Purgeable' | 'CustomizedRecoverable' | 'CustomizedRecoverable+ProtectedSubscription'; +/** Contains response data for the updateSecret operation. */ +export type KeyVaultClientUpdateSecretResponse = SecretBundle & { + /** The underlying HTTP response. */ + _response: coreHttp.HttpResponse & { + /** The response body as text (string format) */ + bodyAsText: string; -/** - * Contains response data for the setSecret operation. - */ -export type SetSecretResponse = SecretBundle & { - /** - * The underlying HTTP response. - */ + /** The response body as parsed JSON or XML */ + parsedBody: SecretBundle; + }; +}; + +/** Contains response data for the getSecret operation. */ +export type KeyVaultClientGetSecretResponse = SecretBundle & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: SecretBundle; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretBundle; + }; }; -/** - * Contains response data for the deleteSecret operation. - */ -export type DeleteSecretResponse = DeletedSecretBundle & { - /** - * The underlying HTTP response. - */ +/** Optional parameters. */ +export interface KeyVaultClientGetSecretsOptionalParams + extends coreHttp.OperationOptions { + /** Maximum number of results to return in a page. If not specified, the service will return up to 25 results. */ + maxresults?: number; +} + +/** Contains response data for the getSecrets operation. */ +export type KeyVaultClientGetSecretsResponse = SecretListResult & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: DeletedSecretBundle; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretListResult; + }; }; -/** - * Contains response data for the updateSecret operation. - */ -export type UpdateSecretResponse = SecretBundle & { - /** - * The underlying HTTP response. - */ +/** Optional parameters. */ +export interface KeyVaultClientGetSecretVersionsOptionalParams + extends coreHttp.OperationOptions { + /** Maximum number of results to return in a page. If not specified, the service will return up to 25 results. */ + maxresults?: number; +} + +/** Contains response data for the getSecretVersions operation. */ +export type KeyVaultClientGetSecretVersionsResponse = SecretListResult & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: SecretBundle; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretListResult; + }; }; -/** - * Contains response data for the getSecret operation. - */ -export type GetSecretResponse = SecretBundle & { - /** - * The underlying HTTP response. - */ +/** Optional parameters. */ +export interface KeyVaultClientGetDeletedSecretsOptionalParams + extends coreHttp.OperationOptions { + /** Maximum number of results to return in a page. If not specified the service will return up to 25 results. */ + maxresults?: number; +} + +/** Contains response data for the getDeletedSecrets operation. */ +export type KeyVaultClientGetDeletedSecretsResponse = DeletedSecretListResult & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: SecretBundle; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: DeletedSecretListResult; + }; }; -/** - * Contains response data for the getSecrets operation. - */ -export type GetSecretsResponse = SecretListResult & { - /** - * The underlying HTTP response. - */ +/** Contains response data for the getDeletedSecret operation. */ +export type KeyVaultClientGetDeletedSecretResponse = DeletedSecretBundle & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: SecretListResult; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: DeletedSecretBundle; + }; }; -/** - * Contains response data for the getSecretVersions operation. - */ -export type GetSecretVersionsResponse = SecretListResult & { - /** - * The underlying HTTP response. - */ +/** Contains response data for the recoverDeletedSecret operation. */ +export type KeyVaultClientRecoverDeletedSecretResponse = SecretBundle & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: SecretListResult; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretBundle; + }; }; -/** - * Contains response data for the getDeletedSecrets operation. - */ -export type GetDeletedSecretsResponse = DeletedSecretListResult & { - /** - * The underlying HTTP response. - */ +/** Contains response data for the backupSecret operation. */ +export type KeyVaultClientBackupSecretResponse = BackupSecretResult & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: DeletedSecretListResult; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: BackupSecretResult; + }; }; -/** - * Contains response data for the getDeletedSecret operation. - */ -export type GetDeletedSecretResponse = DeletedSecretBundle & { - /** - * The underlying HTTP response. - */ +/** Contains response data for the restoreSecret operation. */ +export type KeyVaultClientRestoreSecretResponse = SecretBundle & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: DeletedSecretBundle; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretBundle; + }; }; -/** - * Contains response data for the recoverDeletedSecret operation. - */ -export type RecoverDeletedSecretResponse = SecretBundle & { - /** - * The underlying HTTP response. - */ +/** Optional parameters. */ +export interface KeyVaultClientGetSecretsNextOptionalParams + extends coreHttp.OperationOptions { + /** Maximum number of results to return in a page. If not specified, the service will return up to 25 results. */ + maxresults?: number; +} + +/** Contains response data for the getSecretsNext operation. */ +export type KeyVaultClientGetSecretsNextResponse = SecretListResult & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: SecretBundle; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretListResult; + }; }; -/** - * Contains response data for the backupSecret operation. - */ -export type BackupSecretResponse = BackupSecretResult & { - /** - * The underlying HTTP response. - */ +/** Optional parameters. */ +export interface KeyVaultClientGetSecretVersionsNextOptionalParams + extends coreHttp.OperationOptions { + /** Maximum number of results to return in a page. If not specified, the service will return up to 25 results. */ + maxresults?: number; +} + +/** Contains response data for the getSecretVersionsNext operation. */ +export type KeyVaultClientGetSecretVersionsNextResponse = SecretListResult & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: BackupSecretResult; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: SecretListResult; + }; }; -/** - * Contains response data for the restoreSecret operation. - */ -export type RestoreSecretResponse = SecretBundle & { - /** - * The underlying HTTP response. - */ +/** Optional parameters. */ +export interface KeyVaultClientGetDeletedSecretsNextOptionalParams + extends coreHttp.OperationOptions { + /** Maximum number of results to return in a page. If not specified the service will return up to 25 results. */ + maxresults?: number; +} + +/** Contains response data for the getDeletedSecretsNext operation. */ +export type KeyVaultClientGetDeletedSecretsNextResponse = DeletedSecretListResult & { + /** The underlying HTTP response. */ _response: coreHttp.HttpResponse & { - /** - * The response body as text (string format) - */ - bodyAsText: string; - - /** - * The response body as parsed JSON or XML - */ - parsedBody: SecretBundle; - }; + /** The response body as text (string format) */ + bodyAsText: string; + + /** The response body as parsed JSON or XML */ + parsedBody: DeletedSecretListResult; + }; }; + +/** Optional parameters. */ +export interface KeyVaultClientOptionalParams + extends coreHttp.ServiceClientOptions { + /** Overrides client endpoint. */ + endpoint?: string; +} diff --git a/sdk/keyvault/keyvault-secrets/src/generated/models/mappers.ts b/sdk/keyvault/keyvault-secrets/src/generated/models/mappers.ts index db7d99e7e08d..a5d285a2c794 100644 --- a/sdk/keyvault/keyvault-secrets/src/generated/models/mappers.ts +++ b/sdk/keyvault/keyvault-secrets/src/generated/models/mappers.ts @@ -1,6 +1,6 @@ /* - * Copyright (c) Microsoft Corporation. All rights reserved. - * Licensed under the MIT License. See License.txt in the project root for license information. + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. * * Code generated by Microsoft (R) AutoRest Code Generator. * Changes may cause incorrect behavior and will be lost if the code is regenerated. @@ -8,9 +8,43 @@ import * as coreHttp from "@azure/core-http"; +export const SecretSetParameters: coreHttp.CompositeMapper = { + type: { + name: "Composite", + className: "SecretSetParameters", + modelProperties: { + value: { + serializedName: "value", + required: true, + type: { + name: "String" + } + }, + tags: { + serializedName: "tags", + type: { + name: "Dictionary", + value: { type: { name: "String" } } + } + }, + contentType: { + serializedName: "contentType", + type: { + name: "String" + } + }, + secretAttributes: { + serializedName: "attributes", + type: { + name: "Composite", + className: "SecretAttributes" + } + } + } + } +}; export const Attributes: coreHttp.CompositeMapper = { - serializedName: "Attributes", type: { name: "Composite", className: "Attributes", @@ -34,43 +68,17 @@ export const Attributes: coreHttp.CompositeMapper = { } }, created: { - readOnly: true, serializedName: "created", + readOnly: true, type: { name: "UnixTime" } }, updated: { - readOnly: true, serializedName: "updated", - type: { - name: "UnixTime" - } - } - } - } -}; - -export const SecretAttributes: coreHttp.CompositeMapper = { - serializedName: "SecretAttributes", - type: { - name: "Composite", - className: "SecretAttributes", - modelProperties: { - ...Attributes.type.modelProperties, - recoverableDays: { readOnly: true, - serializedName: "recoverableDays", type: { - name: "Number" - } - }, - recoveryLevel: { - nullable: false, - readOnly: true, - serializedName: "recoveryLevel", - type: { - name: "String" + name: "UnixTime" } } } @@ -78,7 +86,6 @@ export const SecretAttributes: coreHttp.CompositeMapper = { }; export const SecretBundle: coreHttp.CompositeMapper = { - serializedName: "SecretBundle", type: { name: "Composite", className: "SecretBundle", @@ -112,23 +119,19 @@ export const SecretBundle: coreHttp.CompositeMapper = { serializedName: "tags", type: { name: "Dictionary", - value: { - type: { - name: "String" - } - } + value: { type: { name: "String" } } } }, kid: { - readOnly: true, serializedName: "kid", + readOnly: true, type: { name: "String" } }, managed: { - readOnly: true, serializedName: "managed", + readOnly: true, type: { name: "Boolean" } @@ -137,202 +140,122 @@ export const SecretBundle: coreHttp.CompositeMapper = { } }; -export const SecretItem: coreHttp.CompositeMapper = { - serializedName: "SecretItem", +export const KeyVaultError: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "SecretItem", + className: "KeyVaultError", modelProperties: { - id: { - serializedName: "id", - type: { - name: "String" - } - }, - attributes: { - serializedName: "attributes", + error: { + serializedName: "error", type: { name: "Composite", - className: "SecretAttributes" - } - }, - tags: { - serializedName: "tags", - type: { - name: "Dictionary", - value: { - type: { - name: "String" - } - } - } - }, - contentType: { - serializedName: "contentType", - type: { - name: "String" - } - }, - managed: { - readOnly: true, - serializedName: "managed", - type: { - name: "Boolean" + className: "ErrorModel" } } } } }; -export const DeletedSecretBundle: coreHttp.CompositeMapper = { - serializedName: "DeletedSecretBundle", +export const ErrorModel: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "DeletedSecretBundle", + className: "ErrorModel", modelProperties: { - ...SecretBundle.type.modelProperties, - recoveryId: { - serializedName: "recoveryId", + code: { + serializedName: "code", + readOnly: true, type: { name: "String" } }, - scheduledPurgeDate: { + message: { + serializedName: "message", readOnly: true, - serializedName: "scheduledPurgeDate", type: { - name: "UnixTime" + name: "String" } }, - deletedDate: { - readOnly: true, - serializedName: "deletedDate", + innerError: { + serializedName: "innererror", type: { - name: "UnixTime" + name: "Composite", + className: "ErrorModel" } } } } }; -export const DeletedSecretItem: coreHttp.CompositeMapper = { - serializedName: "DeletedSecretItem", +export const SecretUpdateParameters: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "DeletedSecretItem", + className: "SecretUpdateParameters", modelProperties: { - ...SecretItem.type.modelProperties, - recoveryId: { - serializedName: "recoveryId", + contentType: { + serializedName: "contentType", type: { name: "String" } }, - scheduledPurgeDate: { - readOnly: true, - serializedName: "scheduledPurgeDate", + secretAttributes: { + serializedName: "attributes", type: { - name: "UnixTime" + name: "Composite", + className: "SecretAttributes" } }, - deletedDate: { - readOnly: true, - serializedName: "deletedDate", - type: { - name: "UnixTime" - } - } - } - } -}; - -export const SecretRestoreParameters: coreHttp.CompositeMapper = { - serializedName: "SecretRestoreParameters", - type: { - name: "Composite", - className: "SecretRestoreParameters", - modelProperties: { - secretBundleBackup: { - required: true, - serializedName: "value", - type: { - name: "Base64Url" - } - } - } - } -}; - -export const SecretProperties: coreHttp.CompositeMapper = { - serializedName: "SecretProperties", - type: { - name: "Composite", - className: "SecretProperties", - modelProperties: { - contentType: { - serializedName: "contentType", + tags: { + serializedName: "tags", type: { - name: "String" + name: "Dictionary", + value: { type: { name: "String" } } } } } } }; -export const SecretSetParameters: coreHttp.CompositeMapper = { - serializedName: "SecretSetParameters", +export const SecretListResult: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "SecretSetParameters", + className: "SecretListResult", modelProperties: { value: { - required: true, serializedName: "value", + readOnly: true, type: { - name: "String" - } - }, - tags: { - serializedName: "tags", - type: { - name: "Dictionary", - value: { + name: "Sequence", + element: { type: { - name: "String" + name: "Composite", + className: "SecretItem" } } } }, - contentType: { - serializedName: "contentType", + nextLink: { + serializedName: "nextLink", + readOnly: true, type: { name: "String" } - }, - secretAttributes: { - serializedName: "attributes", - type: { - name: "Composite", - className: "SecretAttributes" - } } } } }; -export const SecretUpdateParameters: coreHttp.CompositeMapper = { - serializedName: "SecretUpdateParameters", +export const SecretItem: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "SecretUpdateParameters", + className: "SecretItem", modelProperties: { - contentType: { - serializedName: "contentType", + id: { + serializedName: "id", type: { name: "String" } }, - secretAttributes: { + attributes: { serializedName: "attributes", type: { name: "Composite", @@ -343,39 +266,47 @@ export const SecretUpdateParameters: coreHttp.CompositeMapper = { serializedName: "tags", type: { name: "Dictionary", - value: { - type: { - name: "String" - } - } + value: { type: { name: "String" } } + } + }, + contentType: { + serializedName: "contentType", + type: { + name: "String" + } + }, + managed: { + serializedName: "managed", + readOnly: true, + type: { + name: "Boolean" } } } } }; -export const SecretListResult: coreHttp.CompositeMapper = { - serializedName: "SecretListResult", +export const DeletedSecretListResult: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "SecretListResult", + className: "DeletedSecretListResult", modelProperties: { value: { - readOnly: true, serializedName: "value", + readOnly: true, type: { name: "Sequence", element: { type: { name: "Composite", - className: "SecretItem" + className: "DeletedSecretItem" } } } }, nextLink: { - readOnly: true, serializedName: "nextLink", + readOnly: true, type: { name: "String" } @@ -384,28 +315,45 @@ export const SecretListResult: coreHttp.CompositeMapper = { } }; -export const DeletedSecretListResult: coreHttp.CompositeMapper = { - serializedName: "DeletedSecretListResult", +export const BackupSecretResult: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "DeletedSecretListResult", + className: "BackupSecretResult", modelProperties: { value: { + serializedName: "value", readOnly: true, + type: { + name: "Base64Url" + } + } + } + } +}; + +export const SecretRestoreParameters: coreHttp.CompositeMapper = { + type: { + name: "Composite", + className: "SecretRestoreParameters", + modelProperties: { + secretBundleBackup: { serializedName: "value", + required: true, type: { - name: "Sequence", - element: { - type: { - name: "Composite", - className: "DeletedSecretItem" - } - } + name: "Base64Url" } - }, - nextLink: { - readOnly: true, - serializedName: "nextLink", + } + } + } +}; + +export const SecretProperties: coreHttp.CompositeMapper = { + type: { + name: "Composite", + className: "SecretProperties", + modelProperties: { + contentType: { + serializedName: "contentType", type: { name: "String" } @@ -414,67 +362,84 @@ export const DeletedSecretListResult: coreHttp.CompositeMapper = { } }; -export const BackupSecretResult: coreHttp.CompositeMapper = { - serializedName: "BackupSecretResult", +export const SecretAttributes: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "BackupSecretResult", + className: "SecretAttributes", modelProperties: { - value: { + ...Attributes.type.modelProperties, + recoverableDays: { + serializedName: "recoverableDays", readOnly: true, - serializedName: "value", type: { - name: "Base64Url" + name: "Number" + } + }, + recoveryLevel: { + serializedName: "recoveryLevel", + readOnly: true, + type: { + name: "String" } } } } }; -export const ErrorModel: coreHttp.CompositeMapper = { - serializedName: "Error", +export const DeletedSecretBundle: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "ErrorModel", + className: "DeletedSecretBundle", modelProperties: { - code: { - readOnly: true, - serializedName: "code", + ...SecretBundle.type.modelProperties, + recoveryId: { + serializedName: "recoveryId", type: { name: "String" } }, - message: { + scheduledPurgeDate: { + serializedName: "scheduledPurgeDate", readOnly: true, - serializedName: "message", type: { - name: "String" + name: "UnixTime" } }, - innerError: { + deletedDate: { + serializedName: "deletedDate", readOnly: true, - serializedName: "innererror", type: { - name: "Composite", - className: "ErrorModel" + name: "UnixTime" } } } } }; -export const KeyVaultError: coreHttp.CompositeMapper = { - serializedName: "KeyVaultError", +export const DeletedSecretItem: coreHttp.CompositeMapper = { type: { name: "Composite", - className: "KeyVaultError", + className: "DeletedSecretItem", modelProperties: { - error: { + ...SecretItem.type.modelProperties, + recoveryId: { + serializedName: "recoveryId", + type: { + name: "String" + } + }, + scheduledPurgeDate: { + serializedName: "scheduledPurgeDate", readOnly: true, - serializedName: "error", type: { - name: "Composite", - className: "ErrorModel" + name: "UnixTime" + } + }, + deletedDate: { + serializedName: "deletedDate", + readOnly: true, + type: { + name: "UnixTime" } } } diff --git a/sdk/keyvault/keyvault-secrets/src/generated/models/parameters.ts b/sdk/keyvault/keyvault-secrets/src/generated/models/parameters.ts index fffe35999a9d..0ff67cf05cf6 100644 --- a/sdk/keyvault/keyvault-secrets/src/generated/models/parameters.ts +++ b/sdk/keyvault/keyvault-secrets/src/generated/models/parameters.ts @@ -1,80 +1,164 @@ /* - * Copyright (c) Microsoft Corporation. All rights reserved. - * Licensed under the MIT License. See License.txt in the project root for - * license information. + * Copyright (c) Microsoft Corporation. + * Licensed under the MIT License. * * Code generated by Microsoft (R) AutoRest Code Generator. - * Changes may cause incorrect behavior and will be lost if the code is - * regenerated. + * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ -import * as coreHttp from "@azure/core-http"; +import { + OperationParameter, + OperationURLParameter, + OperationQueryParameter +} from "@azure/core-http"; +import { + SecretSetParameters as SecretSetParametersMapper, + SecretUpdateParameters as SecretUpdateParametersMapper, + SecretRestoreParameters as SecretRestoreParametersMapper +} from "../models/mappers"; -export const apiVersion: coreHttp.OperationQueryParameter = { - parameterPath: "apiVersion", +export const contentType: OperationParameter = { + parameterPath: ["options", "contentType"], mapper: { - required: true, - serializedName: "api-version", + defaultValue: "application/json", + isConstant: true, + serializedName: "Content-Type", type: { name: "String" } } }; -export const maxresults: coreHttp.OperationQueryParameter = { - parameterPath: [ - "options", - "maxresults" - ], + +export const accept: OperationParameter = { + parameterPath: "accept", mapper: { - serializedName: "maxresults", - constraints: { - InclusiveMaximum: 25, - InclusiveMinimum: 1 - }, + defaultValue: "application/json", + isConstant: true, + serializedName: "Accept", type: { - name: "Number" + name: "String" } } }; -export const secretName0: coreHttp.OperationURLParameter = { - parameterPath: "secretName", + +export const value: OperationParameter = { + parameterPath: "value", + mapper: SecretSetParametersMapper +}; + +export const tags: OperationParameter = { + parameterPath: ["options", "tags"], + mapper: SecretSetParametersMapper +}; + +export const contentType1: OperationParameter = { + parameterPath: ["options", "contentType"], + mapper: SecretSetParametersMapper +}; + +export const secretAttributes: OperationParameter = { + parameterPath: ["options", "secretAttributes"], + mapper: SecretSetParametersMapper +}; + +export const vaultBaseUrl: OperationURLParameter = { + parameterPath: "vaultBaseUrl", mapper: { + serializedName: "vaultBaseUrl", required: true, - serializedName: "secret-name", + type: { + name: "String" + } + }, + skipEncoding: true +}; + +export const secretName: OperationURLParameter = { + parameterPath: "secretName", + mapper: { constraints: { - Pattern: /^[0-9a-zA-Z-]+$/ + Pattern: new RegExp("^[0-9a-zA-Z-]+$") }, + serializedName: "secret-name", + required: true, type: { name: "String" } } }; -export const secretName1: coreHttp.OperationURLParameter = { - parameterPath: "secretName", + +export const apiVersion: OperationQueryParameter = { + parameterPath: "apiVersion", mapper: { + serializedName: "api-version", required: true, + type: { + name: "String" + } + } +}; + +export const secretName1: OperationURLParameter = { + parameterPath: "secretName", + mapper: { serializedName: "secret-name", + required: true, type: { name: "String" } } }; -export const secretVersion: coreHttp.OperationURLParameter = { + +export const contentType2: OperationParameter = { + parameterPath: ["options", "contentType"], + mapper: SecretUpdateParametersMapper +}; + +export const secretAttributes1: OperationParameter = { + parameterPath: ["options", "secretAttributes"], + mapper: SecretUpdateParametersMapper +}; + +export const tags1: OperationParameter = { + parameterPath: ["options", "tags"], + mapper: SecretUpdateParametersMapper +}; + +export const secretVersion: OperationURLParameter = { parameterPath: "secretVersion", mapper: { - required: true, serializedName: "secret-version", + required: true, type: { name: "String" } } }; -export const vaultBaseUrl: coreHttp.OperationURLParameter = { - parameterPath: "vaultBaseUrl", + +export const maxresults: OperationQueryParameter = { + parameterPath: ["options", "maxresults"], + mapper: { + constraints: { + InclusiveMaximum: 25, + InclusiveMinimum: 1 + }, + serializedName: "maxresults", + type: { + name: "Number" + } + } +}; + +export const secretBundleBackup: OperationParameter = { + parameterPath: "secretBundleBackup", + mapper: SecretRestoreParametersMapper +}; + +export const nextLink: OperationURLParameter = { + parameterPath: "nextLink", mapper: { + serializedName: "nextLink", required: true, - serializedName: "vaultBaseUrl", - defaultValue: '', type: { name: "String" } diff --git a/sdk/keyvault/keyvault-secrets/src/index.ts b/sdk/keyvault/keyvault-secrets/src/index.ts index c086ad64f199..e72ceee048cf 100644 --- a/sdk/keyvault/keyvault-secrets/src/index.ts +++ b/sdk/keyvault/keyvault-secrets/src/index.ts @@ -19,13 +19,16 @@ import { PageSettings, PagedAsyncIterableIterator } from "@azure/core-paging"; import { PollerLike, PollOperationState } from "@azure/core-lro"; import { DeletionRecoveryLevel, + KnownDeletionRecoveryLevel, KeyVaultClientGetSecretsOptionalParams, - SetSecretResponse, - UpdateSecretResponse, - GetSecretResponse, - GetDeletedSecretResponse, - BackupSecretResponse, - RestoreSecretResponse + KeyVaultClientSetSecretResponse, + KeyVaultClientUpdateSecretResponse, + KeyVaultClientGetSecretResponse, + KeyVaultClientGetDeletedSecretResponse, + KeyVaultClientBackupSecretResponse, + KeyVaultClientRestoreSecretResponse, + SecretBundle, + DeletedSecretBundle } from "./generated/models"; import { KeyVaultClient } from "./generated/keyVaultClient"; import { SDK_VERSION } from "./constants"; @@ -65,6 +68,7 @@ export { SecretClientOptions, DeletedSecret, DeletionRecoveryLevel, + KnownDeletionRecoveryLevel, GetSecretOptions, PipelineOptions, GetDeletedSecretOptions, @@ -203,7 +207,7 @@ export class SecretClient { const span = createSpan("setSecret", unflattenedOptions); - let response: SetSecretResponse; + let response: KeyVaultClientSetSecretResponse; try { response = await this.client.setSecret( this.vaultUrl, @@ -308,7 +312,7 @@ export class SecretClient { const span = createSpan("updateSecretProperties", unflattenedOptions); - let response: UpdateSecretResponse; + let response: KeyVaultClientUpdateSecretResponse; try { response = await this.client.updateSecret( @@ -353,7 +357,7 @@ export class SecretClient { const requestOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("getSecret", requestOptions); - let response: GetSecretResponse; + let response: KeyVaultClientGetSecretResponse; try { response = await this.client.getSecret( this.vaultUrl, @@ -388,7 +392,7 @@ export class SecretClient { const requestOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("getDeletedSecret", requestOptions); - let response: GetDeletedSecretResponse; + let response: KeyVaultClientGetDeletedSecretResponse; try { response = await this.client.getDeletedSecret( @@ -506,7 +510,7 @@ export class SecretClient { const requestOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("backupSecret", requestOptions); - let response: BackupSecretResponse; + let response: KeyVaultClientBackupSecretResponse; try { response = await this.client.backupSecret( @@ -542,7 +546,7 @@ export class SecretClient { const requestOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("restoreSecretBackup", requestOptions); - let response: RestoreSecretResponse; + let response: KeyVaultClientRestoreSecretResponse; try { response = await this.client.restoreSecret( @@ -583,7 +587,8 @@ export class SecretClient { continuationState.continuationToken = currentSetResponse.nextLink; if (currentSetResponse.value) { yield currentSetResponse.value.map( - (bundle) => getSecretFromSecretBundle(bundle).properties + (bundle: SecretBundle | DeletedSecretBundle) => + getSecretFromSecretBundle(bundle).properties ); } } @@ -596,7 +601,8 @@ export class SecretClient { continuationState.continuationToken = currentSetResponse.nextLink; if (currentSetResponse.value) { yield currentSetResponse.value.map( - (bundle) => getSecretFromSecretBundle(bundle).properties + (bundle: SecretBundle | DeletedSecretBundle) => + getSecretFromSecretBundle(bundle).properties ); } else { break; @@ -685,7 +691,8 @@ export class SecretClient { continuationState.continuationToken = currentSetResponse.nextLink; if (currentSetResponse.value) { yield currentSetResponse.value.map( - (bundle) => getSecretFromSecretBundle(bundle).properties + (bundle: SecretBundle | DeletedSecretBundle) => + getSecretFromSecretBundle(bundle).properties ); } } @@ -697,7 +704,8 @@ export class SecretClient { continuationState.continuationToken = currentSetResponse.nextLink; if (currentSetResponse.value) { yield currentSetResponse.value.map( - (bundle) => getSecretFromSecretBundle(bundle).properties + (bundle: SecretBundle | DeletedSecretBundle) => + getSecretFromSecretBundle(bundle).properties ); } else { break; @@ -785,7 +793,9 @@ export class SecretClient { ); continuationState.continuationToken = currentSetResponse.nextLink; if (currentSetResponse.value) { - yield currentSetResponse.value.map((bundle) => getSecretFromSecretBundle(bundle)); + yield currentSetResponse.value.map((bundle: SecretBundle | DeletedSecretBundle) => + getSecretFromSecretBundle(bundle) + ); } } while (continuationState.continuationToken) { @@ -795,7 +805,9 @@ export class SecretClient { ); continuationState.continuationToken = currentSetResponse.nextLink; if (currentSetResponse.value) { - yield currentSetResponse.value.map((bundle) => getSecretFromSecretBundle(bundle)); + yield currentSetResponse.value.map((bundle: SecretBundle | DeletedSecretBundle) => + getSecretFromSecretBundle(bundle) + ); } else { break; } diff --git a/sdk/keyvault/keyvault-secrets/src/lro/delete/operation.ts b/sdk/keyvault/keyvault-secrets/src/lro/delete/operation.ts index 7fd8396e7e8b..a818d97b9df7 100644 --- a/sdk/keyvault/keyvault-secrets/src/lro/delete/operation.ts +++ b/sdk/keyvault/keyvault-secrets/src/lro/delete/operation.ts @@ -9,7 +9,10 @@ import { KeyVaultSecretPollOperationState } from "../keyVaultSecretPoller"; import { KeyVaultClient } from "../../generated/keyVaultClient"; -import { DeleteSecretResponse, GetDeletedSecretResponse } from "../../generated/models"; +import { + KeyVaultClientDeleteSecretResponse, + KeyVaultClientGetDeletedSecretResponse +} from "../../generated/models"; import { createSpan, setParentSpan } from "../../../../keyvault-common/src"; import { getSecretFromSecretBundle } from "../../transformations"; @@ -46,7 +49,7 @@ export class DeleteSecretPollOperation extends KeyVaultSecretPollOperation< const requestOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("generatedClient.deleteKey", requestOptions); - let response: DeleteSecretResponse; + let response: KeyVaultClientDeleteSecretResponse; try { response = await this.client.deleteSecret( this.vaultUrl, @@ -71,7 +74,7 @@ export class DeleteSecretPollOperation extends KeyVaultSecretPollOperation< const responseOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("generatedClient.getDeletedSecret", responseOptions); - let response: GetDeletedSecretResponse; + let response: KeyVaultClientGetDeletedSecretResponse; try { response = await this.client.getDeletedSecret( this.vaultUrl, diff --git a/sdk/keyvault/keyvault-secrets/src/lro/recover/operation.ts b/sdk/keyvault/keyvault-secrets/src/lro/recover/operation.ts index 1cfcaae5ff40..3284c70a14f6 100644 --- a/sdk/keyvault/keyvault-secrets/src/lro/recover/operation.ts +++ b/sdk/keyvault/keyvault-secrets/src/lro/recover/operation.ts @@ -15,7 +15,7 @@ import { } from "../keyVaultSecretPoller"; import { KeyVaultClient } from "../../generated/keyVaultClient"; import { createSpan, setParentSpan } from "../../../../keyvault-common/src"; -import { GetSecretResponse } from "../../generated/models"; +import { KeyVaultClientGetSecretResponse } from "../../generated/models"; import { getSecretFromSecretBundle } from "../../transformations"; /** @@ -48,7 +48,7 @@ export class RecoverDeletedSecretPollOperation extends KeyVaultSecretPollOperati const responseOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("generatedClient.getSecret", responseOptions); - let response: GetSecretResponse; + let response: KeyVaultClientGetSecretResponse; try { response = await this.client.getSecret( this.vaultUrl, @@ -74,7 +74,7 @@ export class RecoverDeletedSecretPollOperation extends KeyVaultSecretPollOperati const responseOptions = operationOptionsToRequestOptionsBase(options); const span = createSpan("generatedClient.recoverDeletedSecret", responseOptions); - let response: GetSecretResponse; + let response: KeyVaultClientGetSecretResponse; try { response = await this.client.recoverDeletedSecret( this.vaultUrl, diff --git a/sdk/keyvault/keyvault-secrets/swagger/README.md b/sdk/keyvault/keyvault-secrets/swagger/README.md index a7d9dc4122b8..68cef4f88c58 100644 --- a/sdk/keyvault/keyvault-secrets/swagger/README.md +++ b/sdk/keyvault/keyvault-secrets/swagger/README.md @@ -2,11 +2,14 @@ > see https://aka.ms/autorest -``` yaml +```yaml typescript: package-name: "@azure/keyvault-secrets" +api-version-parameter: choice +disable-async-iterators: true +v3: true use-extension: - "@microsoft.azure/autorest.typescript": "~5.0.1" + "@autorest/typescript": "6.0.0-dev.20210111.1" azure-arm: false generate-metadata: false add-credentials: false @@ -14,4 +17,5 @@ license-header: MICROSOFT_MIT_NO_VERSION input-file: https://raw.githubusercontent.com/Azure/azure-rest-api-specs/f9caf92527ccff06c5b66380e6f2b4f50f5e82b3/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.2-preview/secrets.json output-folder: ../ source-code-folder-path: ./src/generated +hide-clients: true ``` diff --git a/sdk/keyvault/keyvault-secrets/test/internal/challengeBasedAuthenticationPolicy.spec.ts b/sdk/keyvault/keyvault-secrets/test/internal/challengeBasedAuthenticationPolicy.spec.ts index 93b07af149e2..29ab5e98a84c 100644 --- a/sdk/keyvault/keyvault-secrets/test/internal/challengeBasedAuthenticationPolicy.spec.ts +++ b/sdk/keyvault/keyvault-secrets/test/internal/challengeBasedAuthenticationPolicy.spec.ts @@ -26,7 +26,7 @@ describe("Challenge based authentication tests", () => { let testClient: TestClient; let recorder: Recorder; - beforeEach(async function() { + beforeEach(async function () { const authentication = await authenticate(this); secretSuffix = authentication.secretSuffix; client = authentication.client; @@ -34,44 +34,13 @@ describe("Challenge based authentication tests", () => { recorder = authentication.recorder; }); - afterEach(async function() { + afterEach(async function () { await recorder.stop(); }); // The tests follow - it("Once authenticated, new requests should not authenticate again", async function() { - // Our goal is to intercept how our pipelines are storing the challenge. - // The first network call should indeed set the challenge in memory. - // Subsequent network calls should not set new challenges. - - const sandbox = createSandbox(); - const spy = sandbox.spy(AuthenticationChallengeCache.prototype, "setCachedChallenge"); - - // Now we run what would be a normal use of the client. - // Here we will create two secrets, then flush them. - // testClient.flushSecret deletes, then purges the secrets. - const secretName = testClient.formatName( - `${secretPrefix}-${this!.test!.title}-${secretSuffix}` - ); - const secretNames = [`${secretName}-0`, `${secretName}-1`]; - for (const name of secretNames) { - await client.setSecret(name, "value"); - } - for (const name of secretNames) { - await testClient.flushSecret(name); - } - - // The challenge should have been written to the cache exactly ONCE. - assert.equal(spy.getCalls().length, 1); - - // Back to normal. - sandbox.restore(); - - // Note: Failing to authenticate will make network requests throw. - }); - - it("Authentication should work for parallel requests", async function() { + it("Authentication should work for parallel requests", async function () { const secretName = testClient.formatName( `${secretPrefix}-${this!.test!.title}-${secretSuffix}` ); @@ -104,6 +73,37 @@ describe("Challenge based authentication tests", () => { sandbox.restore(); }); + it("Once authenticated, new requests should not authenticate again", async function () { + // Our goal is to intercept how our pipelines are storing the challenge. + // The first network call should indeed set the challenge in memory. + // Subsequent network calls should not set new challenges. + + const sandbox = createSandbox(); + const spy = sandbox.spy(AuthenticationChallengeCache.prototype, "setCachedChallenge"); + + // Now we run what would be a normal use of the client. + // Here we will create two secrets, then flush them. + // testClient.flushSecret deletes, then purges the secrets. + const secretName = testClient.formatName( + `${secretPrefix}-${this!.test!.title}-${secretSuffix}` + ); + const secretNames = [`${secretName}-0`, `${secretName}-1`]; + for (const name of secretNames) { + await client.setSecret(name, "value"); + } + for (const name of secretNames) { + await testClient.flushSecret(name); + } + + // The challenge should have been written to the cache exactly ONCE. + assert.equal(spy.getCalls().length, 1); + + // Back to normal. + sandbox.restore(); + + // Note: Failing to authenticate will make network requests throw. + }); + describe("parseWWWAuthenticate tests", () => { it("Should work for known shapes of the WWW-Authenticate header", () => { const wwwAuthenticate1 = `Bearer authorization="some_authorization", resource="https://some.url"`;